‘All’s Fair’ and the New Television of Nothingness
hollywoodreporter.com·2h
🏛Digital humanities
Flag this post
New AI security tool lays out key exposures
reversinglabs.com·3d
🎯Threat Hunting
Flag this post
A place to meet new people and connect in Bern
connectbern.ch·3h·
Discuss: Hacker News
💻Local first
Flag this post
The hidden trust problem in API formats
apichangelog.substack.com·1d·
Discuss: Substack
🌐Web Standards
Flag this post
A collection of outlandish HCI papers
floe.butterbrot.org·5h·
Discuss: Hacker News
🏠Homelab Archaeology
Flag this post
Just know stuff (or, how to achieve success in a machine learning PhD) (2023)
kidger.site·1d·
Discuss: Hacker News
📐Linear Algebra
Flag this post
Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
unit42.paloaltonetworks.com·5d
🎯Threat Hunting
Flag this post
Winning at the Edges
holenventures.com·2d·
Discuss: Hacker News
🛡️Error Boundaries
Flag this post
T-Mobile accessed a whistleblower's personal cell phone account to identify him
medium.com·3d·
Discuss: Hacker News
🔗Data Provenance
Flag this post
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
cloud.google.com·4d·
🎯Threat Hunting
Flag this post
Dynamic Adaptive Risk Assessment for Remote Autonomous Ship Control Utilizing Bayesian Federated Learning
dev.to·1h·
Discuss: DEV
🧠Machine Learning
Flag this post
SonicWall blames state hackers for damaging data breach
techradar.com·3d
🔓Hacking
Flag this post
Hyundai IT services breach could put 2.7 million Hyundai, Kia owners in the US at risk
techradar.com·2d
🚨Incident Response
Flag this post
About KeePassXC's code quality control (KeePassXC blog)
lwn.net·4h
📜Proof Carrying Code
Flag this post
Thoughts on Building Reliable Systems
medium.com·1d·
🛡️Error Boundaries
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.com·3d
📡Feed Security
Flag this post
Show HN: XML-Lib – An over-engineered XML workflow with guardrails and proofs
github.com·2d·
Discuss: Hacker News
Proof Automation
Flag this post
Predictive Maintenance Optimization via Multi-Modal Anomaly Scoring and Dynamic Resource Allocation
dev.to·19h·
Discuss: DEV
👁️Observatory Systems
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·4d
🎫Kerberos Exploitation
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.to·5d·
Discuss: DEV
🛡️WASM Security
Flag this post