Louvre museum tightens security with additional CCTV cameras
france24.com·1d
🌡️Archive Physics
Flag this post
Weeknotes: 2025-W45
thomasrigby.com·2h
🦋Format Metamorphosis
Flag this post
Beefs, ops, and escalating violence: Inside Melbourne’s youth gang culture
abc.net.au·22h
🌍Cultural Algorithms
Flag this post
I’m a committed introvert – but no AI will take away the joy I get from other people | Emma Beddington
theguardian.com·8h
🏛Digital humanities
Flag this post
How to recover from a mistake without losing credibility
tibinotes.substack.com·9h·
Discuss: Substack
🚨Incident Response
Flag this post
Just know stuff (or, how to achieve success in a machine learning PhD) (2023)
kidger.site·1d·
Discuss: Hacker News
📐Linear Algebra
Flag this post
Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
unit42.paloaltonetworks.com·4d
🎯Threat Hunting
Flag this post
Winning at the Edges
holenventures.com·2d·
Discuss: Hacker News
🛡️Error Boundaries
Flag this post
Owning the Stack: Why IP Retention Is Mandatory for Coding ASI
autohand.ai·2d·
Discuss: Hacker News
🔒WASM Capabilities
Flag this post
Consumer Financial Protection Bureau's security falls apart amid layoffs
theregister.com·5d
🔓Hacking
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.com·4d·
🎯Threat Hunting
Flag this post
Washington Post among breach victims in Oracle EBS zero-day attacks
scworld.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Flag this post
How to ship apps faster with full-stack Claude Code setup (Skills, MCP, Plugins)
dev.to·6h·
Discuss: DEV
🏠Homelab Pentesting
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.org·3d
🔍Vector Forensics
Flag this post
I built a Python tool to quickly evaluate Kubernetes NetworkPolicy security
reddit.com·1d·
Discuss: r/kubernetes
📦Container Security
Flag this post
'Landfall' Malware Targeted Samsung Galaxy Users
darkreading.com·2d
💿WORM Storage
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.org·4d
🛡️eBPF Security
Flag this post
Show HN: XML-Lib – An over-engineered XML workflow with guardrails and proofs
github.com·2d·
Discuss: Hacker News
Proof Automation
Flag this post
Bundestag: Coalition agrees on NIS2 directive implementation
heise.de·3d
⚖️Legal Compliance
Flag this post
AI Agents Are Going Rogue: Here's How to Rein Them In
darkreading.com·2d
🔓Hacking
Flag this post