NISP contractor fingerprint submissions resume
dcsa.dod.afpims.milΒ·12h
πCyberSecurity
Flag this post
Crime Scene Investigators Are Revealing Their Most Bone-Chilling Cases, And I'm Genuinely Afraid To Sleep Tonight
yahoo.comΒ·3d
πCyberSecurity
Flag this post
MCV-Intention: A Multimodalities and Cross-View Dataset for Human Assembly Intention Recognition
nature.comΒ·14h
πJCL
Flag this post
Shelly Group SE (SHGPF) Q3 2025 Earnings Call Transcript
seekingalpha.comΒ·4h
πLegacy Migration
Flag this post
The AI use case doom loop
πLegacy Migration
Flag this post
A porch pirate nabbed every parcel in our street - then police swooped on our neighbour and you'll never guess what happened next: TOM UTLEY
dailymail.co.ukΒ·8h
πCyberSecurity
Flag this post
I visited the house Sara Sharif was murdered in. The things I saw appalled me... but it was what police did that left me truly outraged. This is why her death i...
dailymail.co.ukΒ·8h
πCyberSecurity
Flag this post
Daily Tech News Roundup - 2025-11-14
πLegacy Migration
Flag this post
NotebookLM helped me improve my home lab
xda-developers.comΒ·14h
πJCL
Flag this post
Perimeter Medical Imaging AI, Inc. (PINK:CA) Q3 2025 Earnings Call Transcript
seekingalpha.comΒ·1d
πLegacy Migration
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comΒ·2d
πCyberSecurity
Flag this post
I've Seen Enough: Measuring the Toll of Content Moderation on Mental Health
arxiv.orgΒ·4h
πCyberSecurity
Flag this post
InfoSec News Nuggets 11/11/2025
aboutdfir.comΒ·2d
πCyberSecurity
Flag this post
ESS Tech (GWH) Q3 2025 Earnings Call Transcript
fool.comΒ·10h
πLegacy Migration
Flag this post
Delhi Red Fort blast kills 13: What happened as police invoke βterrorβ law?
aljazeera.comΒ·3d
πCyberSecurity
Flag this post
Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform
thehackernews.comΒ·1d
πCyberSecurity
Flag this post
Russia strikes nearly all districts of Kyiv, causing power and water outages
nordot.appΒ·6h
πCyberSecurity
Flag this post
Loading...Loading more...