How credentials get stolen in seconds, even with a script-kiddie-level phish
malwarebytes.comΒ·11h
🎯NTLM Attacks
Flag this post
New homepage for YINI is now up live! β€” a modern, structured config format
yini-lang.orgΒ·2dΒ·
Discuss: r/programming
πŸ“‹Format Specification
Flag this post
Angstrom-level imaging and 2D surfaces allow real-time tracking and steering of DNA
phys.orgΒ·3h
🧬Palindrome Codes
Flag this post
Network and Risk Analysis of Surety Bonds
arxiv.orgΒ·19h
πŸ•ΈοΈGraph Algorithms
Flag this post
Braemar Plc (BSEAF) Q2 2026 Earnings Call Prepared Remarks Transcript
seekingalpha.comΒ·1h
πŸ”—Data Provenance
Flag this post
LLM-Guided Reinforcement Learning with Representative Agents for Traffic Modeling
arxiv.orgΒ·19h
πŸ”²Cellular Automata
Flag this post
Tiny Model, Big Logic: Diversity-Driven Optimization Elicits Large-Model Reasoning Ability in VibeThinker-1.5B
arxiv.orgΒ·19h
🎡Audio ML
Flag this post
DiagnoLLM: A Hybrid Bayesian Neural Language Framework for Interpretable Disease Diagnosis
arxiv.orgΒ·19h
🎡Audio ML
Flag this post
Gemini API Tools 2025: Grounded Maps, Easy RAG, Flawless JSONβ€”Dev Starter Pack
dev.toΒ·6hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Flag this post
Introducing agent-to-agent protocol support in Amazon Bedrock AgentCore Runtime
aws.amazon.comΒ·2h
πŸ€–Network Automation
Flag this post
Agentic Orchestrator with Tiger CLI
dev.toΒ·1dΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Flag this post
Downer EDI Limited (DNERY) Shareholder/Analyst Call Transcript
seekingalpha.comΒ·16h
πŸ“‹PREMIS Events
Flag this post
Cognex Corporation (CGNX) Presents at Baird 55th Annual Global Industrial Conference Transcript
seekingalpha.comΒ·2h
πŸ“‹PREMIS Events
Flag this post
A Diffusion Model to Shrink Proteins While Maintaining Their Function
arxiv.orgΒ·19h
🧬Copy Number Variants
Flag this post
Enhanced C-AFM Nanomaterial Characterization via Dynamic Bayesian Network Optimization
dev.toΒ·6hΒ·
Discuss: DEV
🧠Machine Learning
Flag this post
Google Summer of Code 2025 Reports: Using bubblewrap to add sandboxing to NetBSD
blog.netbsd.orgΒ·3d
πŸ”’WASM Capabilities
Flag this post
RAG-targeted Adversarial Attack on LLM-based Threat Detection and Mitigation Framework
arxiv.orgΒ·19h
🎯Threat Hunting
Flag this post
Knowledge-based anomaly detection for identifying network-induced shape artifacts
arxiv.orgΒ·1d
πŸ”Vector Forensics
Flag this post
EncouRAGe: Evaluating RAG Local, Fast, and Reliable
arxiv.orgΒ·1d
πŸ”Information Retrieval
Flag this post