Qt for MedTech Pre- and Post-Market Surveillance
qt.io·1d
📊Homelab Monitoring
A disenshittification moment from the land of mass storage
doctorow.medium.com·22h
🧲Magnetic Philosophy
Threat-Informed TPRM: A New Standard for Supply Chain Security
bitsight.com·1d
🎯Threat Hunting
What the 2025 Elastic Global Threat Report reveals about the evolving threat landscape
elastic.co·3d
🎯Threat Hunting
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.com·22h
🔓Hacking
AI models can acquire backdoors from surprisingly few malicious documents
arstechnica.com·1d
🔓Hacking
Shadow AI: The Risks of Employees Using Unapproved AI Tools
dev.to·23h·
Discuss: DEV
Proof Automation
Defining a Standard Taxonomy for Segmentation
blogs.cisco.com·3d
🎯Threat Hunting
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.org·1d
Effect Handlers
Announcing Amazon Quick Suite: your agentic teammate for answering questions and taking action
aws.amazon.com·1d·
Discuss: Hacker News
🌊Streaming Systems
Doing Math with Embeddings for Better AI Ad Targeting
ethicalads.io·2d·
Discuss: Hacker News
📊Feed Optimization
AI can help your DevSecOps pipeline
spiceworks.com·21h·
Discuss: Hacker News
🏠Homelab Pentesting
Experimenting with ACL2 and Claude Code
mikedodds.org·22h·
Discuss: Hacker News
👑Isabelle
Sorting encrypted data without decryption: a practical trick
dev.to·19h·
Discuss: DEV
🔐Hash Functions
SIEM vs SOAR: The Key Differences for Modern Security Teams
securityscorecard.com·18h
🚨Incident Response
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Real-Time AI-Powered DDoS Detection
timeplus.com·3d·
Discuss: Hacker News
🕵️Network Forensics
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·21h
🎫Kerberos Exploitation
A new breed of analyzers
daniel.haxx.se·22h·
🐛Fuzzing
I Built the Perfect Workflow and attracted some friends in the process
graemefawcett.ca·11h·
Discuss: Hacker News
Proof Automation