Tycoon 2FA Phishing Kit Analysis
cybereason.com·3d
🎫Kerberos Attacks
Flag this post
Google’s proposed Android changes won’t save sideloading
androidauthority.com·22h·
🔓Open Source Software
Flag this post
Catalog of reliability properties for blockchains (Antithesis)
antithesis.com·3d·
Discuss: Hacker News
🤝Distributed Consensus
Flag this post
Using XDP for Egress Traffic
loopholelabs.io·1d·
🖥️Modern Terminals
Flag this post
AI Uses Functions to Fetch Real Data (Not Just Chat)
farukalpay.substack.com·2d·
Discuss: Substack
🎙️Whisper
Flag this post
Western Digital Promo Code: 10% Off
wired.com·4h
🇸🇪Swedish Filesystems
Flag this post
Rideshare giant moves 200 Macs out of the cloud, saves $2.4 million
theregister.com·8h
🍎Apple Archive
Flag this post
A Friendly Tour of Process Memory on Linux
0xkato.xyz·3d·
Discuss: Hacker News
💾Memory Mapping
Flag this post
Changing the AI narrative from liberation to acceleration
idratherbewriting.com·1d·
Discuss: Hacker News
⚙️Proof Engineering
Flag this post
Embedding TypeScript
andrews.substack.com·1d·
🎯Gradual Typing
Flag this post
Automated Beam Loss Mitigation via Adaptive Impedance Shaping in Superconducting Cyclotrons
dev.to·1d·
Discuss: DEV
🔬Optical Physics
Flag this post
Fast Answering Pattern-Constrained Reachability Queries with Two-Dimensional Reachability Index
arxiv.org·3d
🌸Bloom Filters
Flag this post
How I Automated My Client Onboarding — And Saved 10+ Hours Every Week
dev.to·1d·
Discuss: DEV
📊Feed Optimization
Flag this post
SonicWall blames state hackers for damaging data breach
techradar.com·1d
🔓Hacking
Flag this post
SonicWall Firewall Backups Stolen by Nation-State Actor
darkreading.com·14h
🔓Hacking
Flag this post
Tech With Tim: 3 Unique Python Features You NEED To Know
dev.to·8h·
Discuss: DEV
🌀Brotli Internals
Flag this post
The Constrained Application Protocol (CoAP)
datatracker.ietf.org·3d·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Amcor: Reliable High-Yield Dividend Aristocrat You Can Still Buy Cheap
seekingalpha.com·2h
📡RSS
Flag this post
Building PRRover: A FastAPI GitHub PR Reviewer with Telex A2A Integration
dev.to·3d·
Discuss: DEV
gRPC
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·3d
🔐Homomorphic Encryption
Flag this post