Note
hsu.cyยท2d
โฌœMinimalism
Flag this post
Why Preserve? To Connect!
spellboundblog.comยท1d
๐ŸบFormat Archaeology
Flag this post
Rocket Software Expert on Modernizing and Securing COBOL Systems
channelinsider.comยท23hยท
Discuss: Hacker News
๐Ÿ›๏ธCOBOL Archaeology
Flag this post
End of Life: Changes to Eclipse Jetty and CometD
webtide.comยท1dยท
Discuss: r/programming
๐Ÿ”“Open Source Software
Flag this post
How to implement resource-based authorization (resource-based vs. role-based vs. attribute-based)
cerbos.devยท20hยท
Discuss: r/programming
๐Ÿ”Capability Systems
Flag this post
AI Security: Defining and Defending Cybersecurityโ€™s Next Frontier
sentinelone.comยท2d
๐ŸŽฏThreat Hunting
Flag this post
Code legacy: Analyzing Erlang's C and C++ modules
pvs-studio.comยท21hยท
Discuss: Hacker News
โœ…Format Verification
Flag this post
'Landfall' spyware abused zero-day to hack Samsung Galaxy phones
techcrunch.comยท23hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
APPLE-SA-11-03-2025-5 tvOS 26.1
seclists.orgยท20h
๐ŸŽฌVideo Codecs
Flag this post
APPLE-SA-11-03-2025-6 watchOS 26.1
seclists.orgยท20h
๐Ÿ›ก๏ธARM TrustZone
Flag this post
Noise Injection: Improving Out-of-Distribution Generalization for Limited Size Datasets
arxiv.orgยท1d
๐Ÿง Machine Learning
Flag this post
[RoastMyProject] My first App that's written in 100% Go and no JS
reddit.comยท18hยท
Discuss: r/golang
๐ŸŒWeb Standards
Flag this post
Unauthorized access to Dell CloudLink and Command Monitor possible
heise.deยท2d
๐Ÿ”“Hacking
Flag this post
Nikkei Suffers Breach Via Slack Compromise
darkreading.comยท2d
๐Ÿ”“Hacking
Flag this post
A Criminology of Machines
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata
Flag this post
SafeMigrate: Never Fear Database Migrations Again with AI Agents
dev.toยท7hยท
Discuss: DEV
๐ŸššData Migration
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.orgยท2dยท
Discuss: Hacker News
๐Ÿ“กNetwork Protocol Design
Flag this post
Congressional Budget Office confirms it was hacked
techcrunch.comยท17h
๐Ÿ”“Hacking
Flag this post
Beyond reactive security: why continuous mobile device monitoring is essential
jamf.comยท3d
๐ŸšจIncident Response
Flag this post