Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
unit42.paloaltonetworks.com·20h
👁️Observability
Flag this post
D.J. Bernstein: The Good News Archive
⚡Zig
Flag this post
A Short Survey of Compiler Backends
⚙️LLVM
Flag this post
New malware uses AI to adapt during attacks, report finds
therecord.media·6h
📱Edge AI
Flag this post
Trustworthy Quantum Machine Learning: A Roadmap for Reliability, Robustness, and Security in the NISQ Era
arxiv.org·15h
📱Edge AI
Flag this post
Pro-Russian Hackers Use Linux VMs to Hide in Windows
darkreading.com·22h
⚡Zig
Flag this post
The Protocol: ZKSync Aims to Revamp Its Tokenomics Model
coindesk.com·1h
⛓️Blockchain
Flag this post
CampusGuard & VO Form Strategic Partnership to Expand in the U.S.
prnewswire.com·22h
⛓️Blockchain
Flag this post
Akamai Research: AI Bots Threaten the Foundation of Web-Based Business Models
prnewswire.com·1d
💬NLP
Flag this post
Why core security controls for vibe coding are critical
reversinglabs.com·1d
📱Edge AI
Flag this post
Let's Get Physical: A New Convergence for Electrical Grid Security
darkreading.com·2d
🏗️Systems Design
Flag this post
SecurityScorecard CISO Steve Cobb on CBS: Secret Service Takes Down SIM Farm Threat Near UNGA
securityscorecard.com·2m
🔌Embedded Systems
Flag this post
I've created a leetcode for system design
⚡Zig
Flag this post
Can low-altitude mobility enhance the resilience of urban public transportation systems?
sciencedirect.com·4h
🏗️Systems Design
Flag this post
Attackers abuse Gemini AI to develop ‘Thinking Robot’ malware and data processing agent for spying purposes
theregister.com·6h
📱Edge AI
Flag this post
Building Resilient Event-Driven Systems: Lessons from the Distributed Trenches
🏗️Systems Design
Flag this post
How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
research.checkpoint.com·8h
🔧Embedded Rust
Flag this post
Loading...Loading more...