WEST Office Hour β November 13th, from 10am-11am PT
cdlib.orgΒ·21h
πΈοΈWARC Archives
Flag this post
A first look at the adoption of BGP-based DDoS scrubbing services: A five-year longitudinal analysis
blog.apnic.netΒ·1d
π£οΈBGP Hijacking
Flag this post
Dissecting my MiniBanners program β part 1
subethasoftware.comΒ·2d
πΊVT100
Flag this post
Black Swans in OSINT: Why We Keep Missing the Impossible
dutchosintguy.comΒ·2d
πTerminal Forensics
Flag this post
[Deep Dive] How We Solved Poker: From Academic Bots to Superhuman AI (1998-2025)
π²Cellular Automata
Flag this post
Stop vibe coding your unit tests
πFuzzing
Flag this post
Improving agent with semantic search Semantic search significantly improves coding agent performance with 12.5% higher accuracy, improves code retention and dec...
πSemantic Search
Flag this post
Atomically accurate de novo design of antibodies with RFdiffusion
π§¬Copy Number Variants
Flag this post
A Hackerβs Journey to NASAβs Hall of Fame
infosecwriteups.comΒ·3d
πHacking
Flag this post
Geometric Data Valuation via Leverage Scores
arxiv.orgΒ·1d
πDifferential Geometry
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.orgΒ·3d
πVector Forensics
Flag this post
Encryption is under attack β but it's "vital for law enforcement," said former US investigator
techradar.comΒ·6d
πHacking
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.comΒ·27m
π‘Feed Security
Flag this post
The Unseen Engine: How Enterprise Data Management Fuels Modern Business
πData Provenance
Flag this post
Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered
blog.checkpoint.comΒ·2d
πΊKerberos Archaeology
Flag this post
Loading...Loading more...