Keep an eye on your Meta Business account, these fake extensions could steal your credentials
techradar.comยท14h
๐Ÿš€Indie Hacking
A Syzkaller Summer: Fixing False Positive Soft Lockups in net/sched Fuzzing
willsroot.ioยท2dยท
๐ŸงชBinary Fuzzing
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code
dev.toยท1dยท
Discuss: DEV
โšกProof Automation
LLM-Generated Rules Engines for LLM Explainability
brain.coยท20hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Prediction of evolutionarily conserved RNA secondary structures from sequences
academic.oup.comยท8hยท
Discuss: Hacker News
๐Ÿ•ณ๏ธPersistent Homology
I've been reading Ghostty's agent-generated bug fixes
ampcode.comยท12hยท
Discuss: Hacker News
โŸทBidirectional Programming
Docling: The Document Alchemist
towardsdatascience.comยท16h
๐Ÿ“‹Document Grammars
Lobsters Interview with Susam
lobste.rsยท17hยท
Discuss: Lobsters
๐Ÿ”—Concatenative Programming
Binary Patching: A Complete Step-by-Step Guide
infosecwriteups.comยท4d
๐Ÿฆ Malware Analysis
You Already Have Our Data, Take Our Phone Calls Too (FreePBX CVE-2025-57819)
labs.watchtowr.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
IT Security Weekend Catch Up โ€“ September 12, 2025
badcyber.comยท15h
๐Ÿ”“Hacking
The future of microoptimization
goldenstack.netยท4hยท
Discuss: Hacker News
๐ŸงฎCompute Optimization
FFmpeg โ€“ The Ultimate Guide
img.lyยท2dยท
Discuss: Hacker News
๐ŸŽž๏ธFFmpeg Filters
Reversing the licensing on a Quantum Scalar i40
blackjack.codesยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Mosyle uncovers new cross-platform malware undetected by antivirus tools
9to5mac.comยท1dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Top 11 Document Parsing AI Tools for developers in 2025
dev.toยท1hยท
Discuss: DEV
๐Ÿ“„Document Digitization
The Trellis: A Gardening Metaphor for Software Engineering
sinclairtarget.comยท19hยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Coco โ€“ Solving the Expression Problem in Standard OO (Java, C#, Scala, ..)
drops.dagstuhl.deยท1dยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
9 Best Practices for API Security โš”๏ธ
newsletter.systemdesign.oneยท23h
โšกgRPC
Secure QKD Network Resilience via Dynamic Threshold-Adaptive Key Reconciliation
dev.toยท21hยท
Discuss: DEV
๐Ÿ”Quantum Cryptography