'I was a random victim,' California man injured by frozen water balloon thrown through windshield
ketv.comΒ·30m
πŸ”’CyberSecurity
Flag this post
IaC First, Unconventional with Intent
proxylity.comΒ·12hΒ·
Discuss: Hacker News
πŸ”„Legacy Migration
Flag this post
Bringing the best of AI search to Copilot
microsoft.comΒ·12h
πŸ“‹JCL
Flag this post
Network and Risk Analysis of Surety Bonds
arxiv.orgΒ·6h
πŸ”’CyberSecurity
Flag this post
Teach Your AI to Think Like a Senior Engineer
every.toΒ·3d
πŸ“‹JCL
Flag this post
Looking for feedback on Linnix, an open-source eBPF incident monitor
reddit.comΒ·7hΒ·
Discuss: r/devops
πŸ“‹JCL
Flag this post
The Productivity Theater in Remote Work
dev.toΒ·22hΒ·
Discuss: DEV
πŸ“‹JCL
Flag this post
Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’CyberSecurity
Flag this post
Vibe Code Warning – from 1k to 10k lines, a personal casestudy
github.comΒ·23hΒ·
Discuss: Lobsters
©️C Programming
Flag this post
Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles
arxiv.orgΒ·1d
πŸ”’CyberSecurity
Flag this post
Sloppy : Chrome Extension for AI Slop Detection with Agentic Postgres
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“‹JCL
Flag this post
Distractor Injection Attacks on Large Reasoning Models: Characterization andDefense
paperium.netΒ·13hΒ·
Discuss: DEV
πŸ”’CyberSecurity
Flag this post
The unbearable lightness of getting scammed: Future of full scale cybersecurity
techradar.comΒ·3d
πŸ”’CyberSecurity
Flag this post
A Practical Guide to AI Voice Agent Observability: Debugging Latency with VideoSDK Traces
dev.toΒ·23hΒ·
Discuss: DEV
⚑Systems Programming
Flag this post
18 people sent to the hospital after mobile lounge crashes at Washington D.C.-area airport
the-independent.comΒ·11h
πŸ¦€Rust
Flag this post
Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
thehackernews.comΒ·15h
πŸ”’CyberSecurity
Flag this post
AI chat privacy at risk: Microsoft details Whisper Leak side-channel attack
securityaffairs.comΒ·1d
πŸ”’CyberSecurity
Flag this post
Herodotus Trojan Mimics Human Typing to Steal Banking Credentials
blogger.comΒ·2d
πŸ”’CyberSecurity
Flag this post