Optimizing Web Performance: Unpacking Fastly’s Intelligent Compression Defaults
fastly.comΒ·20h
πŸ“¦Deflate
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comΒ·4d
🦠Parasitic Storage
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comΒ·3d
🌳Archive Merkle Trees
Flag this post
Windows Zero-Day Vulnerability Exploited Against Diplomats During LNK Display
heise.deΒ·6h
πŸ”“Hacking
Flag this post
Cure - Verification-First Programming for the BEAM
cure-lang.orgΒ·9hΒ·
Discuss: Lobsters
βš–οΈVerification Calculi
Flag this post
Masked Softmax Layers in PyTorch
mcognetta.github.ioΒ·4hΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Flag this post
Gated DeltaNet (Linear Attention variant in Qwen3-Next and Kimi Linear)
sebastianraschka.comΒ·17hΒ·
Discuss: r/LLM
πŸ€–Grammar Induction
Flag this post
Show HN: DeepFake – Free AI Face Swap Online
deepfakefusion.comΒ·16hΒ·
Discuss: Hacker News
βœ…Verification Codecs
Flag this post
The Case Against PGVector
alex-jacobs.comΒ·7hΒ·
Discuss: Hacker News
πŸ—‚οΈVector Databases
Flag this post
Prosecutors allege incident response pros used ALPHV/BlackCat to commit string of ransomware attacks
cyberscoop.comΒ·32m
πŸ”“Hacking
Flag this post
dcaf: An implementation of the ACE-OAuth framework
docs.rsΒ·2hΒ·
Discuss: Hacker News
🌐NetworkProtocols
Flag this post
Free AI Tools Like CheatEye: Make Your Own Profile Finder (2025)
dev.toΒ·1dΒ·
Discuss: DEV
πŸš€Indie Hacking
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
dev.toΒ·10hΒ·
Discuss: DEV
🌊Streaming Systems
Flag this post
How I Built gemini-imagen: A CLI for Google Gemini Image Generation
dev.toΒ·2hΒ·
Discuss: DEV
πŸ€–Archive Automation
Flag this post
FSWatcher: A new cross platform file watcher for MacOS, Linux and Windows
reddit.comΒ·8hΒ·
Discuss: r/golang
πŸ“°Feed Readers
Flag this post
Ehxb | Path Traversal Vulnerabilities
infosecwriteups.comΒ·11h
πŸ’£ZIP Vulnerabilities
Flag this post
GMDSOFT MD-Series Q3 Release Note Highlights
forensicfocus.comΒ·3h
πŸ’ΏDAT Forensics
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·21h
πŸ”—Hash Chains
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.comΒ·20h
πŸ”“Hacking
Flag this post
Simple Additions, Substantial Gains: Expanding Scripts, Languages, and Lineage Coverage in URIEL+
arxiv.orgΒ·15h
πŸ”—Concatenative Languages
Flag this post