How to limit the power of big tech
bbc.co.ukยท1d
๐คAndroid
Flag this post
Pete Recommends โ Weekly highlights on cyber security issues, November 8, 2025
bespacific.comยท5d
๐Web
Flag this post
Seeing Inside the Vortex: Detecting Living off the Land Techniques
blogs.cisco.comยท3d
๐คAI
Flag this post
GPT-5.1 Prompting Guide
๐คAI
Flag this post
World leaders urged to prioritize health in climate action
bulatlat.comยท2h
๐คAI
Flag this post
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
blog.nviso.euยท1d
๐คAI
Flag this post
Vega: Low-Latency Zero-Knowledge Proofs over Existing Credentials
eprint.iacr.orgยท1d
๐คAndroid
Flag this post
Air Force veteran says cybersecurity is a natural career transition for civilian lifeโand itโs a field with more than 500,000 open jobs
fortune.comยท3d
๐คAI
Flag this post
Show HN: AI-built tools with security by default
๐คAI
Flag this post
Amazon Elastic Kubernetes Service gets independent affirmation of its zero operator access design
aws.amazon.comยท2d
๐คAndroid
Flag this post
AI System Abused in China-Linked Cyberattack, Says Anthropic
circleid.comยท10h
๐คAI
Flag this post
MCAD: Multimodal Context-Aware Audio Description Generation For Soccer
arxiv.orgยท1d
๐คAI
Flag this post
Phishing emails disguised as spam filter alerts are stealing logins
malwarebytes.comยท2d
๐คAndroid
Flag this post
Acer Copilot+ Laptops Power On-Device AI for ElasticStage Vinyl
windowsforum.comยท12h
๐คAI
Flag this post
Privacy Beyond Pixels: Latent Anonymization for Privacy-Preserving Video Understanding
arxiv.orgยท1d
๐คAndroid
Flag this post
Facial-R1: Aligning Reasoning and Recognition for Facial Emotion Analysis
arxiv.orgยท23h
๐คAI
Flag this post
Loading...Loading more...