Napster, Kazaa, and the Entrepreneurial Outlaws
brajeshwar.com·2d
📼Cassette Culture
Job Opportunity: Information Security Program Manager
citizenlab.ca·1d
🎯Threat Hunting
Defeating Nondeterminism in LLM Inference
simonwillison.net·21h
🤖Lisp Machines
Most school hacks carried out by their own pupils, watchdog says
bbc.com·16h·
Discuss: Hacker News
🔓Hacking
NIST Revises Security & Privacy Control Catalog for Software Updates & Patches
nist.gov·1d·
Discuss: Hacker News
🔤EBCDIC Privacy
Bridgestone Americas continues probe as it looks to restore operations
cybersecuritydive.com·2d
🚨Incident Response
Senator Flags Microsoft’s Role in the Ascension Ransomware Hack
decipher.sc·1d
🔓Hacking
Introducing Tier 1 Reachability: Precision CVE Triage for Enterprise Teams
socket.dev·2d·
Discuss: Hacker News
🛡️eBPF Security
This macOS malware was laying dormant for years, but may have been silently infecting thousands of devices
techradar.com·13h
🦠Malware Analysis
Oldcastle accelerates document processing with Amazon Bedrock
aws.amazon.com·1d
🤖Archive Automation
Stop Writing SQL by Hand: Building My MVP to Chat With Databases
dev.to·8h·
Discuss: DEV
🧠Query Planners
Automated Analysis of X-ray Scattering Anomalies using Bayesian Neural Networks for Material Characterization
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
Beijing went to 'EggStreme' lengths to attack Philippines military, researchers say
theregister.com·1d·
Discuss: Hacker News
🔓Hacking
GPT-5 vs GPT-5-chat: what exactly is the difference?
dev.to·1d·
Discuss: DEV
🔌Interface Evolution
Apple’s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss
seclists.org·3d
🔒Hardware Attestation
Hackers breached Salesloft ’s GitHub in March, and used stole tokens in a mass attack
securityaffairs.com·3d
🎫Kerberos Attacks
Understanding CSRF and How to Prevent It in Your Application — Part 2
infosecwriteups.com·2d
🔤EBCDIC Privacy
Causal evidence of racial and institutional biases in accessing paywalled articles and scientific data
arxiv.org·23h·
Discuss: Hacker News
🎓Academic Torrents
A Spatiotemporal Adaptive Local Search Method for Tracking Congestion Propagation in Dynamic Networks
arxiv.org·2d
🕸️Network Topology