Research Worth Reading Week 45/2025
pentesterlab.comΒ·2d
πŸ’‰SQL Injection
Flag this post
Asked for help without enough information
workplace.stackexchange.comΒ·19h
πŸ”¬Reverse Engineering
Flag this post
Building an Agentic Food Label Reader for Greater Transparency
databricks.comΒ·13h
🐍Python
Flag this post
Drake: Model-Based Design and Verification for Robotics
drake.mit.eduΒ·9h
🐍Python
Flag this post
Off-Balance Sheet AI: How SPVs Are Financing the Data Center Boom While Hiding Leverage
ernestchiang.comΒ·15hΒ·
Discuss: r/Economics
πŸ”Cybersecurity
Flag this post
original β†—
joecarlsmith.comΒ·7h
πŸ”Cybersecurity
Flag this post
Real-World Java β€’ Victor Grazi, Jeanne Boyarsky & Barry Burd
youtube.comΒ·17h
πŸ”¬Reverse Engineering
Flag this post
Rust vs. Python: Finding the right balance between speed and simplicity
blog.jetbrains.comΒ·1d
🐍Python
Flag this post
Non-recursively deleting a binary tree in constant space: Synthesizing the parent pointer
devblogs.microsoft.comΒ·5dΒ·
Discuss: Hacker News
πŸ”¬Reverse Engineering
Flag this post
Infostealers are making this old security practice new again
nordot.appΒ·4d
🦠Malware Analysis
Flag this post
wayland global positioning
gitlab.freedesktop.orgΒ·2dΒ·
Discuss: r/linux
🐧Linux
Flag this post
Root vulnerability threatens IBM's Db2 database system
heise.deΒ·19h
πŸ’‰SQL Injection
Flag this post
Hot-Swapping and Microservitization-SPL Reporting
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”¬Reverse Engineering
Flag this post
Decentralized Knowledge Graph Augmentation for Semantic Web3 Discovery
dev.toΒ·17hΒ·
Discuss: DEV
🐍Python
Flag this post
Git Basics: A Beginner's Guide to Branches
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”¬Reverse Engineering
Flag this post
RAG-targeted Adversarial Attack on LLM-based Threat Detection and Mitigation Framework
arxiv.orgΒ·1d
πŸ”Cybersecurity
Flag this post
When Bias Pretends to Be Truth: How Spurious Correlations Undermine Hallucination Detection in LLMs
arxiv.orgΒ·1d
🐍Python
Flag this post
Security news weekly round-up - 7th November 2025
dev.toΒ·4dΒ·
Discuss: DEV
πŸ”Cybersecurity
Flag this post
React Hooks for Library Authors
dev.toΒ·3hΒ·
Discuss: DEV
🐳Docker
Flag this post
I Let Attackers Train My AI-powered Security Proxy (Here’s What Happened)
dev.toΒ·15hΒ·
Discuss: DEV
🦈Wireshark
Flag this post