University of Pennsylvania confirms hacker stole data during cyberattack
techcrunch.com·7h
🛡️Cybersecurity
Flag this post
The Hackers Manifesto (The Conscience of a Hacker) (1986)
phrack.org·14h·
Discuss: Hacker News
🤖Cyberpunk
Flag this post
Dive into Systems
diveintosystems.org·2d·
Discuss: Hacker News
⚙️Systems Programming
Flag this post
ShadowLogic: Backdoors in Any Whitebox LLM
arxiv.org·1d
🛡️AI Security
Flag this post
Developing desktop apps from scratch: A feature checklist
alek-tron.com·2h·
Discuss: Hacker News
📁File Systems
Flag this post
Building a P2P Rental Marketplace - Full-Stack Architecture with Flutter & Express.js
revolvo.tech·8h·
Discuss: DEV
🌐Axum
Flag this post
Part 4: Daily Security Habits
open.forem.com·2d·
Discuss: DEV
🔒Security
Flag this post
Building PhishNet: An AI Cybersecurity Agent for Detecting Phishing Threats with Mastra
dev.to·1d·
Discuss: DEV
📱Progressive Web Apps
Flag this post
An overview of the PPPP protocol for IoT cameras
palant.info·7h·
Discuss: Hacker News
QUIC Protocol
Flag this post
Split Learning-Enabled Framework for Secure and Light-weight Internet of Medical Things Systems
arxiv.org·1d
📱Edge AI
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonwillison.net·2d·
Discuss: Hacker News
🛡️AI Security
Flag this post
What data do coding agents send, and where to?
chasersystems.com·1d·
Discuss: Hacker News
🔭Tracing
Flag this post
Capacity Review: The AI Workflow Engine That Understands Vibe Coding (2025)
danielkliewer.com·12h·
Discuss: Hacker News
🎭Program Synthesis
Flag this post
Sidharth S (zidhuxd) : A Young Cybersecurity Researcher Redefining Digital Exploration
dev.to·1d·
Discuss: DEV
🛡️Cybersecurity
Flag this post
SANDEVISTAN TOOLKIT
github.com·2d·
Discuss: DEV
🔍eBPF
Flag this post
US Traces Ransomware Attacks to 2 People Working for Cybersecurity Firms
pcmag.com·1d·
Discuss: Hacker News
🔐Hardware Security
Flag this post
We Tested 6 AI Models on 3 Common Security Exploits
blog.kilocode.ai·45m·
Discuss: Hacker News
🛡️AI Security
Flag this post
Critical UniFi OS Flaw Enables Remote Code Execution
gbhackers.com·1d·
Discuss: Hacker News
🔍eBPF
Flag this post
Text-guided Fine-Grained Video Anomaly Detection
arxiv.org·1d
📱Edge AI
Flag this post
How Hidden Code Decides Who's in Charge: The Silent Governance of AI Through Function-Calling Schemas
dev.to·9h·
Discuss: DEV
🎭Program Synthesis
Flag this post