Vibecoding my way to a crit on GitHub
furbreeze.github.ioยท2hยท
Discuss: Hacker News
๐Ÿ”Cybersecurity
Flag this post
Synthetic Media and Deepfakes: Navigating the Truth Crisis in 2025
thetasvibe.blogspot.comยท4h
๐Ÿ”Cybersecurity
Flag this post
Provably Secure e2ee file transfer CLI (post-quantum-ready)
reddit.comยท14hยท
Discuss: r/webdev
๐Ÿ”’TLS/SSL
Flag this post
Automated Variant Analysis & Kinship Assignment via Multi-Modal Data Fusion
dev.toยท6hยท
Discuss: DEV
๐ŸPython
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioยท2d
๐ŸŽฏPenetration Testing
Flag this post
Best Digital Marketing Institute in Allahabad โ€“ Ndmit Prayagraj
ndmit.comยท6hยท
Discuss: Hacker News
๐ŸPython
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
qwiet.aiยท2dยท
Discuss: DEV
๐Ÿ”ฌReverse Engineering
Flag this post
Ongoing Ransomware Attacks Exploit Linux Vulnerability, CISA Warns
forbes.comยท57m
๐ŸงLinux
Flag this post
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
blogger.comยท2d
๐Ÿ”Cybersecurity
Flag this post
Pathology-CoT: Learning Visual Chain-of-Thought Agent from Expert Whole SlideImage Diagnosis Behavior
paperium.netยท2hยท
Discuss: DEV
๐ŸPython
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.techยท12hยท
๐ŸฆˆWireshark
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.orgยท3d
๐ŸPython
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท1dยท
Discuss: Hacker News
๐ŸŽฏPenetration Testing
Flag this post
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails
dev.toยท9hยท
Discuss: DEV
๐ŸงฑFirewalls
Flag this post
Shadow IT is threatening businesses from within - and todayโ€™s security tools simply canโ€™t keep up
techradar.comยท1d
๐Ÿ”Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท1d
๐Ÿ”Cybersecurity
Flag this post
5 security myths that could be putting your Windows PC at risk
makeuseof.comยท19h
๐Ÿ”Cybersecurity
Flag this post
I'm Building an AI Agent That Automates Competitor Research
drive.google.comยท6hยท
Discuss: DEV
๐ŸPython
Flag this post
Smaller Surfaces
nrempel.comยท14hยท
Discuss: Hacker News
๐ŸงLinux
Flag this post
Real-World Distributed Tracing: Java, OpenTelemetry, and Google Cloud Trace in Production
dev.toยท8hยท
Discuss: DEV
๐Ÿ”’TLS/SSL
Flag this post