Serialization Security, Binary Protocols, Data Interchange, Schema Validation

CDT in NLP Distinguished Lecture Series: Dan Roth
informatics.ed.ac.ukยท1d
๐ŸŽญCultural Informatics
Flag this post
Vibe coding security checklist to prevent breaches
fingerprint.comยท3d
๐Ÿ”“Hacking
Flag this post
Tp-Link Router Deep Research
r0keb.github.ioยท15h
โšกCircuit Archaeology
Flag this post
Cybercom 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls
securityweek.comยท1dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Flag this post
GitHub Actions in Your JetBrains IDE
revenate.github.ioยท7hยท
Discuss: Hacker News
๐Ÿ“‹PREMIS Events
Flag this post
AWS re:Invent 2025: Your guide to security sessions across four transformative themes
aws.amazon.comยท1d
๐ŸŽฏThreat Hunting
Flag this post
AI Gateway from Pydantic
pydantic.devยท1dยท
Discuss: Hacker News
โšกHomebrew CPUs
Flag this post
Ts-event-core: TypeScript functional programming Event Sourcing implementation
github.comยท2dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Flag this post
Show HN: 1Pwned
github.comยท4hยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Flag this post
Reverse Engineering Yaesu FT-70D Firmware Encryption
landaire.netยท2dยท
Discuss: Hacker News
๐Ÿ”“Reverse engineering
Flag this post
Self Hostable and Open Source Multi-Location Uptime Monitoring
govigilant.ioยท16hยท
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Flag this post
Fluidware โ€“ an essay on software in the age of generative abundance
createdbyhonesty.comยท1dยท
๐Ÿ“Code Metrics
Flag this post
Zig GUI from Scratch
vogt.worldยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
The politics of purely client-side apps
pfrazee.leaflet.pubยท1dยท
๐ŸŒŠStreaming Systems
Flag this post
Tour of a pattern matcher: expression and pattern expansion
crumbles.blogยท2dยท
๐Ÿฆ€Rust Macros
Flag this post
Xen exploitation part 1: XSA-105, from nobody to root
blog.quarkslab.comยท11hยท
Discuss: Hacker News
๐Ÿ‘‘RISC-V Privilege
Flag this post
Ask HN: Architecting audit-grade ESG platforms โ€“ AI assistants vs. human CTOs
news.ycombinator.comยท12hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Flag this post
Automated Digital Provenance Verification using Blockchain-Integrated Semantic Analysis
dev.toยท17hยท
Discuss: DEV
๐Ÿ”—Data Provenance
Flag this post
Rust Is Memory Safe, but Logic Bugs Still Occur - SPARK Ada Can Help
news.ycombinator.comยท18hยท
Discuss: Hacker News
๐Ÿฆ€Rust Verification
Flag this post
I can't recommend Grafana anymore
henrikgerdes.meยท22hยท
๐ŸŒŠApache Kafka
Flag this post