FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.com·1d
🏺Kerberos Archaeology
Best infosec-related long reads for the week of 10/4/25
metacurity.com·8h
🛡Cybersecurity
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·1d
🎯Threat Hunting
Investigating targeted “payroll pirate” attacks affecting US universities
microsoft.com·2d
🎯NTLM Attacks
Compliance of mobile games with loot box probability disclosure law in Korea
sciencedirect.com·2d·
Discuss: Hacker News
⚖️Game Preservation Ethics
More on Carmichael
johndcook.com·2d·
Discuss: Hacker News
🔢Reed-Solomon Math
Neural Networks from Scratch in Python: Simpler Than You Think
hamza.se·23h·
Discuss: Hacker News
📊Quantization
A Proof of the Riemann Hypothesis
dev.to·2d·
Discuss: DEV
⚔️Lean Theorem
Adaptive Kernel Regression with Spatio-Temporal Context for Real-Time Object Tracking in Aerial Imagery
dev.to·4h·
Discuss: DEV
🌀Differential Geometry
Automated Spectral Fingerprint Deconvolution for Polymer Identification via Deep Oligomer Networks
dev.to·19h·
Discuss: DEV
🌈Spectroscopy
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·16h·
Discuss: DEV
🔍Vector Forensics
AMD and Sony show first technology of the presumed Playstation 6
heise.de·7h
🖥️Terminal Renaissance
Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.to·1d·
Discuss: DEV
📡Audio Modulation
Saturday Citations: AI chatbots are insincere; childhood memory recall; a tiny chunk of dark matter
phys.org·7h
🌡️Preservation Physics
Effective and Stealthy One-Shot Jailbreaks on Deployed Mobile Vision-Language Agents
arxiv.org·1d
🕵️Vector Smuggling
[R] How to retrieve instructions given to annotators - RLHF
reddit.com·1d·
📚Documentation Archaeology
SSH Security: Why You Should Touch to Verify
ubicloud.com·1d·
Discuss: Hacker News
🔒Hardware Attestation
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
MP who feared her hotel room was bugged by China hits out after spy case collapses
the-independent.com·10h
🕵️Steganographic Archives
How to Reject a Pull Request
github.com·16m·
Discuss: Hacker News
💣ZIP Vulnerabilities