APRS over LoRa with RNode | unsigned.io
unsigned.io·11h
📻Homebrew Protocols
Juniper patched nine critical flaws in Junos Space
securityaffairs.com·7h
🔓Hacking
Evolution of Apple Security Bounty Program
mjtsai.com·1h
🛡️RISC-V Security
Is the End of Detection-Based Security Here?
thenewstack.io·6h
🎯Threat Hunting
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics
Google researchers say Oracle EBR hackers have hit dozens of organizations
techradar.com·9h
🎫Kerberos Attacks
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·3d
📦Container Security
Oracle E-Business Suite exploitation traced back as early as July
cybersecuritydive.com·7h
🔓Hacking
Experimenting with ACL2 and Claude Code
mikedodds.org·9h·
Discuss: Hacker News
👑Isabelle
EDR for AI agent workloads, what would it actually look like?
reddit.com·9h·
Discuss: r/kubernetes
🔍eBPF
Two Kinds of "Relicensing"
writing.kemitchell.com·1d·
🦋Format Evolution
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Sorting encrypted data without decryption: a practical trick
dev.to·6h·
Discuss: DEV
🔐Hash Functions
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·8h
🎫Kerberos Exploitation
Zelos Tech Manages Hundreds of Millions of Files for Autonomous Driving with JuiceFS
dev.to·15h·
Discuss: DEV
💾Proxmox Storage
N8n vs. Windmill vs. Temporal
blog.arcbjorn.com·22h·
Discuss: Hacker News
🌊Stream Processing
Slip – A Lisp System in JavaScript
lisperator.net·8h·
Discuss: Hacker News
🔗Lisp
Ghosts in the Code: A Memorial Grove for Deleted AI
connectingminds.uk·1d·
Discuss: DEV, Hacker News
🏺Protocol Archaeology
The Linus Method: How we simiplifed RFC reviews
devashish.me·5h·
Discuss: Hacker News
⚙️Proof Engineering