Hans-Juergen Schoenig: Counting Customers in PostgreSQL
cybertec-postgresql.comΒ·14h
πŸ’‰SQL Injection
Flag this post
Ground zero: 5 things to do after discovering a cyberattack
welivesecurity.comΒ·1d
🦈Wireshark
Flag this post
Calculating the spreading of fluids in porous materials to understand saltwater in soil
phys.orgΒ·3h
🐍Python
Flag this post
The internet was made for privacy
doctorow.medium.comΒ·4d
πŸ”Cybersecurity
Flag this post
SesameOp Backdoor Uses OpenAI API for Covert C2
darkreading.comΒ·5h
🎯Penetration Testing
Flag this post
Health privacy bill seeks protections for data collected by apps, smartwatches
discuss.privacyguides.netΒ·7m
🦈Wireshark
Flag this post
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
dev.toΒ·3dΒ·
Discuss: DEV
🎯Penetration Testing
Flag this post
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation
dev.toΒ·17hΒ·
Discuss: DEV
🧱Firewalls
Flag this post
Show HN: Polyglot standard library HTTP client C/C++/Rust/Python and benchmarks
github.comΒ·15hΒ·
Discuss: Hacker News
🦈Wireshark
Flag this post
Diving Deeper into Blockchain and Web3 Product Engineering – Week 1 Learnings
farcaster.xyzΒ·2dΒ·
Discuss: DEV
πŸ›£οΈBGP
Flag this post
Predicting & Mitigating Data Corruption in Pure Storage Flash Arrays via Adaptive Bit Error Rate Modeling
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”¬Reverse Engineering
Flag this post
Backend Engineer & MLOps Lead (Temporary Assignment)
dev.toΒ·4hΒ·
Discuss: DEV
🐧Linux
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.orgΒ·15h
🦈Wireshark
Flag this post
H-FA: A Hybrid Floating-Point and Logarithmic Approach to Hardware Accelerated FlashAttention
arxiv.orgΒ·15h
🐍Python
Flag this post
DOGE Prints Lower-Low Sequence as $0.17 Resistance Locks In
coindesk.comΒ·2h
πŸ”Cybersecurity
Flag this post
Informatics-Driven Selection of Polymers for Fuel-Cell Applications
arxiv.orgΒ·1d
🐍Python
Flag this post
Hackers Weaponize Remote Tools to Hijack Cargo Freight
darkreading.comΒ·1d
πŸ”Cybersecurity
Flag this post
Why millions of connected vehicles need automated cyber security
techradar.comΒ·5h
πŸ”Cybersecurity
Flag this post