BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท4d
๐ŸŒDNS Security
Flag this post
kadena-io/pact-5
github.comยท16h
๐Ÿ”“Open Source Software
Flag this post
Employees Are the New Hackers: 1Password Warns AI Use Is Breaking Corporate Security
it.slashdot.orgยท1d
๐Ÿ”“Hacking
Flag this post
We built a simple AI-powered tool for URL Monitoring + On-Call management โ€” now live (Free tier)
reddit.comยท10hยท
Discuss: r/kubernetes
๐Ÿ“ŠHomelab Monitoring
Flag this post
Scala vs. F#
alexn.orgยท14hยท
Discuss: Hacker News
๐Ÿ’งLiquid Types
Flag this post
Three Stages of Enlightenment
essenceofsoftware.comยท3dยท
Discuss: Hacker News
โ„๏ธNordic Design Philosophy
Flag this post
HydraPWK2 Is a Linux Distribution That Simplifies Pentesting
thenewstack.ioยท1d
๐Ÿ›ก๏ธeBPF Security
Flag this post
Generalized Consensus: Discovery and Propagation
multigres.comยท3dยท
Discuss: Hacker News
๐ŸคConsensus Networks
Flag this post
How Pain Can Help Explain AI Sentience
hackernoon.comยท4h
๐Ÿ”ฒCellular Automata
Flag this post
My First Multi-GPU Kernel: Writing All-to-All for AMD MI300X
gau-nernst.github.ioยท17hยท
Discuss: Hacker News
โšกHomebrew CPUs
Flag this post
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
theregister.comยท18h
๐Ÿ”“Hacking
Flag this post
Turning 500 Lines of If-Else Into a Config Switch: Strategy Pattern in Go
dev.toยท3dยท
Discuss: DEV
โš”๏ธLean Tactics
Flag this post
Contrastive Knowledge Transfer and Robust Optimization for Secure Alignment of Large Language Models
arxiv.orgยท13h
๐Ÿ’ปLocal LLMs
Flag this post
US Clouds: German Research Association Aims to Bring Data Back from Abroad
heise.deยท10h
๐ŸŽ“Academic Torrents
Flag this post
Quantum-Powered AI: Revolutionizing Collateral Management by Arvind Sundararajan
dev.toยท23hยท
Discuss: DEV
๐Ÿ”Quantum Cryptography
Flag this post
Automated Predictive Molecular Dynamics for Mycoplasma Contamination Root Cause Analysis
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization
Flag this post
Scalable Multi-Modal Feedback Loop for Constrained Reinforcement Learning in Robotic Grasping
dev.toยท16hยท
Discuss: DEV
โœ‹Tactile Computing
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
After the Last Git Commit
gist.github.comยท21hยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Flag this post
Show HN: Claude Code disrupted programming. Bringing that power to office worker
blog.gbase.aiยท7hยท
Discuss: Hacker News
๐Ÿค–Archive Automation
Flag this post