Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.com·3d·
Discuss: Hacker News
🔐Hardware Security
Flag this post
Show HN: Kumi – a portable, declarative, functional core for business logic
kumi-play-web.fly.dev·34m·
Discuss: Hacker News
🔗Dependent Types
Flag this post
I've created a leetcode for system design
reddit.com·6h·
Discuss: r/programming
🎨Design Systems
Flag this post
Disassembling Terabytes of Random Data with Zig and Capstone to Prove a Point
jstrieb.github.io·9h·
🔓Binary Exploitation
Flag this post
Data breach at major Swedish software supplier impacts 1.5M
bleepingcomputer.com·1d·
Discuss: Hacker News
🔍Digital Forensics
Flag this post
Automated REST API Anomaly Detection via Graph Neural Network-Driven Causal Inference
dev.to·1h·
Discuss: DEV
📱Edge AI
Flag this post
Automating error analysis for AI agents – what works and doesn't
atla-ai.com·1d·
Discuss: Hacker News
🚀MLOps
Flag this post
Video Invisible Watermarking at Scale
engineering.fb.com·1d·
Discuss: Hacker News
🎬WebCodecs
Flag this post
Geometric Data Valuation via Leverage Scores
arxiv.org·14h
💰TigerBeetle
Flag this post
Analysis of NGate malware campaign (NFC relay)
cert.pl·2d·
Discuss: Hacker News
🏷️Memory Tagging
Flag this post
Inside Pinecone: Slab Architecture
pinecone.io·1d·
Discuss: Hacker News
📋Columnar Storage
Flag this post
Russian spies pack custom malware into hidden VMs on Windows machines
theregister.com·1d·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
The New Standard of Due Diligence for Buyers Agents in Australia
dev.to·8h·
Discuss: DEV
🔍Digital Forensics
Flag this post
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
dev.to·1d·
Discuss: DEV
🔒Security
Flag this post
Using Coding Agents to Decompile Nintendo 64 Games
blog.chrislewis.au·7h·
Discuss: Hacker News
🔓Binary Exploitation
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·11h·
Discuss: Hacker News
🤖Cyberpunk
Flag this post
Dive into Systems
diveintosystems.org·2d·
Discuss: Hacker News
⚙️Systems Programming
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🛡️AI Security
Flag this post
Split Learning-Enabled Framework for Secure and Light-weight Internet of Medical Things Systems
arxiv.org·1d
📱Edge AI
Flag this post
Part 4: Daily Security Habits
open.forem.com·2d·
Discuss: DEV
🔒Security
Flag this post