DynamoDB outage analysis and asking experts for timelines
buttondown.com·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Show HN: KnexBridge – Generate TypeScript and Zod Types from Knex DB
github.com·16h·
Discuss: Hacker News
🦀Rust
Flag this post
Fintech CEO caught manipulating social media likes
patrickstoica.substack.com·1d·
Discuss: Substack
📡Side-Channel Attacks
Flag this post
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
tenable.com·1d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
A SQLite extension for the crazy ones because everything could be a database
kruzenshtern.org·3h·
Discuss: Hacker News
Formal Methods
Flag this post
Show HN: I gamified passwords to make them easier to remember
passwordgame.apps.benthayer.com·2d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Think for Yourself
kevlinhenney.medium.com·2d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
CEF.AI is hiring for AI Innovator position in SF
join.com·1d·
Discuss: Hacker News
Formal Methods
Flag this post
We Tested 6 AI Models on 3 Common Security Exploits
blog.kilocode.ai·1d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
OpenLoRa: Validating LoRa Implementations Through an Open-Sourced Framework
usenix.org·1d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Myers Diff for Tab Management: Part 2
deontevanterpool.com·1d·
Discuss: Hacker News
Formal Methods
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·3d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Origin and Evolution of the Globstar
mergify.com·11h·
Discuss: Hacker News
Formal Methods
Flag this post
Video Invisible Watermarking at Scale
engineering.fb.com·2d·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
OVHcloud: Quantum random number generation SSL certificates for all customers
blog.ovhcloud.com·3d·
Discuss: Hacker News
🔒Cryptography
Flag this post
AI Native Architecture: Intelligence by Design
sumant.bearblog.dev·23h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·4d·
Discuss: Hacker News
🐛Vulnerability Research
Flag this post
Improving Structured Outputs in the Gemini API
blog.google·1d·
Discuss: Hacker News
Formal Methods
Flag this post
New court docs put Sam Altman’s honesty in spotlight again
fastcompany.com·10h·
Discuss: Hacker News
📡Side-Channel Attacks
Flag this post
Context Engineering 2.0: The Context of Context Engineering
arxiviq.substack.com·4h·
Discuss: Substack
🐛Vulnerability Research
Flag this post