Note
hsu.cyยท2d
โฌMinimalism
Flag this post
Why Preserve? To Connect!
spellboundblog.comยท1d
๐บFormat Archaeology
Flag this post
Rocket Software Expert on Modernizing and Securing COBOL Systems
๐๏ธCOBOL Archaeology
Flag this post
How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
๐Capability Systems
Flag this post
AI Security: Defining and Defending Cybersecurityโs Next Frontier
sentinelone.comยท2d
๐ฏThreat Hunting
Flag this post
APPLE-SA-11-03-2025-5 tvOS 26.1
seclists.orgยท20h
๐ฌVideo Codecs
Flag this post
APPLE-SA-11-03-2025-6 watchOS 26.1
seclists.orgยท20h
๐ก๏ธARM TrustZone
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.orgยท1d
๐ง Machine Learning
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.deยท2d
๐Hacking
Flag this post
Nikkei Suffers Breach Via Slack Compromise
darkreading.comยท2d
๐Hacking
Flag this post
Well, that is awkward - MIT Sloan forced to withdraw "absolutely ridiculous" paper claiming AI played "significant role" in most ransomware attacks
techradar.comยท2d
๐ฆ Malware Analysis
Flag this post
A Criminology of Machines
arxiv.orgยท2d
๐ฒCellular Automata
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
๐กNetwork Protocol Design
Flag this post
Congressional Budget Office confirms it was hacked
techcrunch.comยท17h
๐Hacking
Flag this post
Beyond reactive security: why continuous mobile device monitoring is essential
jamf.comยท3d
๐จIncident Response
Flag this post
Loading...Loading more...