Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
unit42.paloaltonetworks.com·20h
👁️Observability
Flag this post
D.J. Bernstein: The Good News Archive
aaronsw.com·3d·
Discuss: Hacker News
Zig
Flag this post
A Short Survey of Compiler Backends
abhinavsarkar.net·8h·
⚙️LLVM
Flag this post
New malware uses AI to adapt during attacks, report finds
therecord.media·6h
📱Edge AI
Flag this post
Malicious Android apps on Google Play downloaded 42 million times
bleepingcomputer.com·16h·
Discuss: r/Android
Zig
Flag this post
Trustworthy Quantum Machine Learning: A Roadmap for Reliability, Robustness, and Security in the NISQ Era
arxiv.org·15h
📱Edge AI
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.com·22h
Zig
Flag this post
The Protocol: ZKSync Aims to Revamp Its Tokenomics Model
coindesk.com·1h
⛓️Blockchain
Flag this post
CampusGuard & VO Form Strategic Partnership to Expand in the U.S.
prnewswire.com·22h
⛓️Blockchain
Flag this post
Akamai Research: AI Bots Threaten the Foundation of Web-Based Business Models
prnewswire.com·1d
💬NLP
Flag this post
Why core security controls for vibe coding are critical
reversinglabs.com·1d
📱Edge AI
Flag this post
Let's Get Physical: A New Convergence for Electrical Grid Security
darkreading.com·2d
🏗️Systems Design
Flag this post
SecurityScorecard CISO Steve Cobb on CBS: Secret Service Takes Down SIM Farm Threat Near UNGA
securityscorecard.com·2m
🔌Embedded Systems
Flag this post
I've created a leetcode for system design
reddit.com·6h·
Discuss: r/programming
Zig
Flag this post
Can low-altitude mobility enhance the resilience of urban public transportation systems?
sciencedirect.com·4h
🏗️Systems Design
Flag this post
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
theregister.com·6h
📱Edge AI
Flag this post
File Chunking: Why It Matters for Cybersecurity in Modern Applications
dev.to·1d·
Discuss: DEV
Zig
Flag this post
Building Resilient Event-Driven Systems: Lessons from the Distributed Trenches
dev.to·1d·
Discuss: DEV
🏗️Systems Design
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.com·8h
🔧Embedded Rust
Flag this post
Web Developer Travis McCracken on API Gateway Design with Rust and Go
dev.to·7h·
Discuss: DEV
🔧Embedded Rust
Flag this post