CERT-UA warns UAC-0245 targets Ukraine with CABINETRAT backdoor
securityaffairs.com·15h
🔐Soviet Cryptography
Tips to Protect Your Posts About Reproductive Health From Being Removed
eff.org·16h
🏠Personal Archives
Advanced Document Processing using AI
newsletter.techworld-with-milan.com·18h·
Discuss: r/programming
📄Document Digitization
Adaptive Environmental Monitoring and Smart Access Control
hackster.io·8h
🏠Home Automation
5 Essential Cyber Security Tips for Cyber Security Awareness Month
blog.checkpoint.com·1d
🛡Cybersecurity
Doodling icons in a grid
sachachua.com·1d
🖋Typography
AI in Digital Forensics: a Tool, not an Oracle
blog.elcomsoft.com·1h
👂Audio Evidence
Show HN: I made a md editor without the stuff that distracts me from writing
github.com·15m·
Discuss: Hacker News
📼Audio Cassettes
FPGA Security Features
controlpaths.com·1d·
Discuss: Hacker News
🌊Stream Ciphers
Invisibility Cloak: Disappearance under Human Pose Estimation via Backdoor Attacks
arxiv.org·5h
🕵️Vector Smuggling
From the Browser to the Bloodstream
puri.sm·17h
🔗Data Provenance
Wombat's Book of Nix
mhwombat.codeberg.page·14h·
nix
I've locked myself out of my digital life (2022)
shkspr.mobi·1d·
Discuss: Hacker News
🏠Personal Archives
"Zero-Copy" – a modern data fantasy
blog.metamirror.io·20h·
Discuss: Hacker News
🔗Data Provenance
lukas-blecher/LaTeX-OCR
github.com·1d
👁️Constructive OCR
Vector Databases Guide: RAG Applications 2025
dev.to·22h·
Discuss: DEV
🗂️Vector Databases
Foreground vs. Background: Analyzing Typographic Attack Placement in Autonomous Driving Systems
hackernoon.com·1d
🔍Character Forensics
Variational Secret Common Randomness Extraction
arxiv.org·5h
🧮Kolmogorov Complexity
How do you get your dev team to shift left by themselves for real?
dev.to·1h·
Discuss: DEV
⚔️Lean Tactics
Breaking decompilers with single-function, and no-main() C codebases
joshua.hu·11h·
Discuss: Hacker News
🧠Lisp Dialects