A Womanโ€™s Magic Transcends Politics and Borders in This Timely, Fantastical Short Story
gizmodo.comยท3h
๐Ÿ”’security
Flag this post
๐Ÿ—บ๏ธ Engineering for Emergencies: How to Build a Real-Time Disaster Route Finder with Open Source Mapping
shalinibhavi525-sudo.github.ioยท13hยท
Discuss: DEV
๐Ÿ”ŒEmbedded Systems
Flag this post
Two charged in Harvard Medical School explosion conspiracy
thehill.comยท1d
๐Ÿ”’security
Flag this post
AMD confirms critical security risk for many Zen 5 CPUs
tweaktown.comยท1d
๐Ÿ”’security
Flag this post
Dive into Systems
diveintosystems.orgยท3dยท
Discuss: Hacker News
โšกSystems Programming
Flag this post
Opinion: This Is the Biggest Bubble on Wall Street Right Now -- and I'm Not Talking About Artificial Intelligence (AI)
finance.yahoo.comยท7h
๐Ÿ”ŒEmbedded Systems
Flag this post
Who Really Owns All Your Health Data?
lifehacker.comยท5h
๐Ÿ”’security
Flag this post
Design principles for teams working in healthcare
mikegallagher.orgยท13h
๐Ÿ”’security
Flag this post
A Ukrainian primer explains how Russia gathers information from cell phone use in the grey zone and its consequences.
threadreaderapp.comยท5h
๐Ÿ”ŒEmbedded Systems
Flag this post
New comment by gtirloni in "Ask HN: Who is hiring? (November 2025)"
virtasant.teamtailor.comยท2dยท
Discuss: Hacker News
๐ŸŒNetwork Security
Flag this post
Zama Announces Strategic Acquisition of KKRT Labs to Scale Confidentiality On Public Blockchains
hackernoon.comยท1d
๐Ÿ”Cryptography
Flag this post
With AI, every leader is a CEO (โ€˜chief experimentation officerโ€™)
fastcompany.comยท15h
๐ŸŒNetwork Security
Flag this post
Microsoft will force its 'superintelligence' to be a 'humanist' and play nice with people
theregister.comยท3h
๐Ÿ”ŒEmbedded Systems
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
We Tested 6 AI Models on 3 Common Security Exploits
blog.kilocode.aiยท1dยท
Discuss: Hacker News
๐ŸŒNetwork Security
Flag this post
Developer Case Study: Cursor and Claude Code Suggested Building a Proxy. Shotgun CLI Found LiteLLM Instead.
dev.toยท9hยท
Discuss: DEV
๐Ÿ”งAssembly Language
Flag this post
Automated REST API Anomaly Detection via Graph Neural Network-Driven Causal Inference
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠSports Analytics
Flag this post
Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iranโ€“Israel Tensions
thehackernews.comยท1d
๐Ÿ”’security
Flag this post
Foreign hackers breach U.S. Congressional Budget Office - WaPo
nordot.appยท4h
๐Ÿ”’security
Flag this post