Ten Years of Community Support
letsencrypt.orgยท16h
๐Ÿš€Indie Hacking
MS-A2 VCF 9.0 Lab: Deploying Model Endpoint with DirectPath I/O using VMware for Private AI Services (PAIS)
williamlam.comยท1h
๐ŸŒWASI
Agentic AI Is Quickly Resetting the Internet
thenewstack.ioยท21h
๐ŸŒŠStreaming Systems
Disrupting malicious uses of AI: October 2025
openai.comยท13hยท
Discuss: Hacker News
๐Ÿค–AI Curation
New MatrixPDF toolkit turns PDFs into phishing and malware lures
bleepingcomputer.comยท21hยท
Discuss: Hacker News
๐Ÿ“กFeed Security
Eliminating Boilerplate in PHP API Documentation
ltscommerce.devยท23hยท
Discuss: Hacker News
๐ŸŒWeb Standards
I created a new image protection method that AI can't remove. Here's the proof.
reddit.comยท1dยท
Discuss: r/artificial
๐Ÿ’งManuscript Watermarks
Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users
cybereason.comยท2d
๐ŸงฌPostgreSQL Forensics
Ask HN: Do you roll your own agent or use a framework?
news.ycombinator.comยท3hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Securing AI agents at the scale of the internet
godaddy.comยท5dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Zero Trust: a proven solution for the new AI security challenge
techradar.comยท7h
โšกProof Automation
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.toยท19hยท
Discuss: DEV
๐ŸŒNetworkProtocols
Claude Code uses WebFetch vs. WebSearch (observations, schemas, prompts)
mikhail.ioยท18hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
How we trained an ML model to detect DLL hijacking
securelist.comยท1d
๐Ÿ”—Binary Similarity
Virtual Sovereignty: Private Internet Capital and Infrastructural Power in U.S.
academic.oup.comยท4hยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Countless security vulnerabilities in Dell PowerProtect Data Domain closed
heise.deยท1d
๐Ÿ”“Hacking
I built LimitWarden, a tool to auto-patch missing resource limits with usage-based requests
reddit.comยท3hยท
Discuss: r/kubernetes
๐ŸŒŠStreaming Systems
Troops and veteransโ€™ personal information leaked in CPAP Medical data breach
malwarebytes.comยท5h
๐Ÿ”“Hacking
Red Hat breach escalates as criminals collaborate on 'multi-terabyte' extortion plot
theregister.comยท4hยท
๐ŸŽซKerberos Attacks