Tillis Targets Debanking
cato.orgยท20h
๐Ÿ”คc
Flag this post
Thursday open line
arktimes.comยท12h
๐ŸงLinux
Flag this post
Why do prisoners keep getting released by mistake?
newstatesman.comยท4h
๐ŸงLinux
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท5dยท
๐Ÿ”Cryptography
Flag this post
Lessons from the Vibe Coding Trenches
brandonharris.ioยท40mยท
Discuss: Hacker News
๐Ÿ”งAssembly Language
Flag this post
Building an Accessible Before/After Slider in React
jsdev.spaceยท6hยท
Discuss: Hacker News
๐Ÿ”ŒEmbedded Systems
Flag this post
4 overlooked Gmail tools that rescued my cluttered inbox
makeuseof.comยท2d
๐ŸงLinux
Flag this post
Beyond computational assumptions: How BGKW replaced hardness with isolation
reddit.comยท2dยท
Discuss: r/compsci
๐Ÿ”Cryptography
Flag this post
Beyond Localhost: Security, Authentication, and Real-World Sources
hackernoon.comยท4d
๐ŸŒNetwork Security
Flag this post
Conduent Healthcare Data Breach Exposes 10.5 Million Patient Records in Massive 2025 Cyber Incident
blogger.comยท20h
๐Ÿ›ก๏ธCybersecurity
Flag this post
Sudden improvement in GPT-5 (maybe this is gpt5 they intended to?)
reddit.comยท4hยท
Discuss: r/ChatGPT
๐Ÿ”ŒEmbedded Systems
Flag this post
I just created go-picker: a small Go library for picking values from maps, typically parsed JSON.
github.comยท2dยท
Discuss: r/golang
๐Ÿ”คc
Flag this post
Code Smell 313 - Workslop Code
dev.toยท2dยท
Discuss: DEV
๐Ÿ”งAssembly Language
Flag this post
Building PhishNet: An AI Cybersecurity Agent for Detecting Phishing Threats with Mastra
dev.toยท2dยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
Trump administration speeds up new rules that would make it easier to charge some protesters
orlandosentinel.comยท13h
๐ŸŒNetwork Security
Flag this post
Microsoft warns a key OpenAI API is being exploited to launch cyberattacks
techradar.comยท2d
๐ŸŒNetwork Security
Flag this post
How to Build a User Authentication System
dev.toยท4dยท
Discuss: DEV
๐ŸŒNetwork Security
Flag this post
SonicWall blames state-sponsored hackers for September security breach
securityaffairs.comยท1d
๐ŸŒNetwork Security
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Cryptography
Flag this post