How Bucket Forking Brings GitHub-Style Forking To Object Storage
thenewstack.ioยท12h
๐ฟZFS Internals
Flag this post
What would you do? Opening my lab to the internet, DNS/cert/design/security questions.
๐DNS over QUIC
Flag this post
HydraPWK2 Is a Linux Distribution That Simplifies Pentesting
thenewstack.ioยท1d
๐ก๏ธeBPF Security
Flag this post
3rd November โ Threat Intelligence Report
research.checkpoint.comยท21h
๐Hacking
Flag this post
Towards Automated Petrography
arxiv.orgยท2h
๐คPaleographic Automation
Flag this post
Panther: A Cost-Effective Privacy-Preserving Framework for GNN Training and Inference Services in Cloud Environments
arxiv.orgยท2h
๐ปLocal LLMs
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท4d
๐Hash Functions
Flag this post
Prepared for a cyber attack? The three questions that businesses must ask themselves
techradar.comยท19h
๐จIncident Response
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท5d
๐Audio Forensics
Flag this post
Show HN: Extrai โ An open-source tool to fight LLM randomness in data extraction
๐Document Grammar
Flag this post
A Hackerโs Journey to NASAโs Hall of Fame
infosecwriteups.comยท22h
๐Hacking
Flag this post
A Hybrid Deep Learning and Forensic Approach for Robust Deepfake Detection
arxiv.orgยท1d
๐Vector Forensics
Flag this post
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LlmJailbreaks and Prompt Injections
๐Hacking
Flag this post
LLM-Centric RAG with Multi-Granular Indexing and Confidence Constraints
arxiv.orgยท1d
๐ง Learned Indexing
Flag this post
OpenSIR: Open-Ended Self-Improving Reasoner
arxiv.orgยท2h
๐ฎProof Search
Flag this post
Enhancing LOD Integrity via Hyperdimensional Semantic Graph Normalization & Automated Anomaly Detection
๐ฐContent Curation
Flag this post
Identification of Capture Phases in Nanopore Protein Sequencing Data Using a Deep Learning Model
arxiv.orgยท2h
๐ง Machine Learning
Flag this post
Loading...Loading more...