Strengthening national cyber resilience through observability and threat hunting
ncsc.gov.uk·5d
🎯Threat Hunting
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·4d
🌐WARC Forensics
Vexing Exceptions
ericlippert.com·3d·
Discuss: Hacker News
🧪Binary Fuzzing
Firefox is the best mobile browser
kelvinjps.com·1d·
Discuss: Hacker News
🌐Web Standards
LineageOS 23
lineageos.org·1d·
🔓Open Source Software
Dealing with Eventual Consistency and Idempotency in projections
event-driven.io·2d·
Discuss: r/programming
🌊Stream Processing
‘Cavalier and aggressive’: why are border agents flooding into US cities?
theguardian.com·21h
🕵️Vector Smuggling
Ask HN: Claude Code Alternative
news.ycombinator.com·2d·
Discuss: Hacker News
🪟Awesome windows command-line
Low Complexity Detector for XL-MIMO Uplink: A Cross Splitting Based Information Geometry Approach
arxiv.org·7h
🧮Kolmogorov Complexity
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
securityweek.com·4d·
Discuss: Hacker News
🔓Hacking
Enhancing Grant Proposal Evaluation via Hyperdimensional Semantic Analysis and Recursive Validation
dev.to·1d·
Discuss: DEV
📋Document Grammar
Predictive Modeling of Neutron Capture Cross-Sections via Bayesian Kernel Regression
dev.to·9h·
Discuss: DEV
🧲Magnetic Resonance
Redis patches 13-Year-Old Lua flaw enabling Remote Code Execution
securityaffairs.com·5d
🌐WASI
Google Agent Development Kit (ADK) for TypeScript
github.com·1d·
Discuss: Hacker News
💧Liquid Types
Building an AI-Powered Lead Gen Workflow with n8n, Apify, and Gemini
dev.to·2d·
Discuss: DEV
🤖Archive Automation
Computer vision AI VTI’s against Phishing
vmray.com·5d
👁️Perceptual Hashing
How to Build Modular AI Personalities with LuminoraCore v1.0
dev.to·1d·
Discuss: DEV
🎯Gradual Typing