Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·20h
🇸🇪Swedish Cryptanalysis
How to Tame Varnish Memory Usage Safely
fastly.com·3d
🎯Performance Forensics
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·3d
📺VT100
Vulnerability Management – Requirements, Scoping & Target Setting
blog.nviso.eu·2d
🔐Capability Systems
Building Transformer Models from Scratch with PyTorch (10-day Mini-Course)
machinelearningmastery.com·2h
🤖Grammar Induction
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.com·1d
🔓Hacking
Idea to how to fix the fan speed problem on Dell r740 with idrac firmware past 7.0
dell.com·6h·
Discuss: r/homelab
🔌Operating system internals
Implementing ZADD If Key Exists
rozumem.xyz·2d·
Discuss: Hacker News
Redis Internals
Moving Compute Intensive Lambdas from AWS to Vercel
moneyonfire.com·7h·
Discuss: Hacker News
🔄Sync Engine
How Do SSDs Work?
extremetech.com·1d·
Discuss: Hacker News
🧲Magnetic Recording
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·1d·
Discuss: Hacker News
🌐Protocol Synthesis
IBM Ships Homegrown “Spyre” Accelerators, Embraces Anthropic For AI Push
nextplatform.com·1d·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Hyper-Personalized Cyberbullying Mitigation via Adaptive Linguistic Fingerprinting and Behavioral Anomaly Detection
dev.to·20h·
Discuss: DEV
🎛️Feed Filtering
RecGen: a powerful tool to create recommendation systems
dev.to·1d·
Discuss: DEV
🔗Constraint Handling
How I found an unauthenticated goldmine of PII
infosecwriteups.com·1d
🔓Hacking
100 Poisoned Examples Can Hijack Any AI Model (Even GPT-4-Scale LLMs)
dev.to·2d·
Discuss: DEV
Proof Automation
My BTL1 Review
infosecwriteups.com·1d
🔐Certificate Analysis
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·1d·
Discuss: Hacker News
🎯Threat Hunting
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·1d·
Discuss: Hacker News
🚀Indie Hacking
Immersive Historical Reconstruction Validation via Multi-Sensor VR Data Fusion & Causal Inference
dev.to·7h·
Discuss: DEV
🏺Computational Archaeology