QuantumScape: A Convex Long On The Future Of Solid-State Energy
seekingalpha.comยท7h
๐Embedded Systems
Flag this post
1.โ
Bio-Digital Defiance: Defying The Order of the Creator Control of your travel, speech, thought and soul.
threadreaderapp.comยท1d
๐Cryptography
Flag this post
Improved swarm model with informed agents to prevent stealth attackers based on a vigilance mechanism
sciencedirect.comยท23h
๐security
Flag this post
How does HTTP work?
๐Network Security
Flag this post
The Most Critical Linux Kernel Breaches of 2025 So Far
linuxjournal.comยท22h
๐Network Security
Flag this post
We built a collaboration platform on Claude Code. Here's what we learned.
โกSystems Programming
Flag this post
Growing Threat of npm Supply Chain Attacks and the Runtime Fix That Stops It
๐Network Security
Flag this post
Unsupervised Learning for Industrial Defect Detection: A Case Study on Shearographic Data
arxiv.orgยท10h
๐Embedded Systems
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography for Secure Model Aggregation in Cross-Silo Envir...
๐Cryptography
Flag this post
CleanStart Launches Industry's Most Comprehensive SBOM Analyzer to Strengthen Container Security
prnewswire.comยท1h
๐Network Security
Flag this post
Former cybersecurity firm experts attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.comยท4h
๐Network Security
Flag this post
New comment by gantengx in "Ask HN: Who wants to be hired? (November 2025)"
๐Embedded Systems
Flag this post
YouTube โGhost Networkโ Spreads Infostealer via 3,000 Fake Videos
hackread.comยท2d
๐Network Security
Flag this post
Logicalis invests in and expands Intelligent Security solutions to combat escalating cyber threats
prnewswire.comยท20h
๐Network Security
Flag this post
Akamai Research: AI Bots Threaten the Foundation of Web-Based Business Models
prnewswire.comยท1d
๐Network Security
Flag this post
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
๐Network Security
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
๐security
Flag this post
To write secure code, be less gullible than your AI
stackoverflow.blogยท1d
๐Network Security
Flag this post
Loading...Loading more...