AI is changing the relationship between journalist and audience. There is much at stake | Margaret Simons
theguardian.comยท1d
๐Ÿ“กRSS Readers
Flag this post
Recipe 8.6. Picking a Random Line from a File (Perl Cookbook)
csg.sph.umich.eduยท14h
๐Ÿ“Text Compression
Flag this post
KT Corporation's Business Improves, But Security Breach Counsels Caution (Rating Upgrade)
seekingalpha.comยท1d
๐ŸŽซKerberos Attacks
Flag this post
Squirrel Goes Down the Rabbit Hole โ€ฆ Podcast
jericho.blogยท1d
๐Ÿ”“Hacking
Flag this post
Cyber Humanities for Heritage Security
cacm.acm.orgยท1d
๐ŸŽญCultural Informatics
Flag this post
November 21, 2025
buttondown.comยท1d
๐Ÿ“กRSS Automation
Flag this post
WhatsApp compromise leads to Astaroth deployment
news.sophos.comยท2d
๐Ÿ›กCybersecurity
Flag this post
New Al Zimmermann's Programming Contests: Powerful Sums
azspcs.comยท11hยท
Discuss: Hacker News
๐ŸงฎSMT Solvers
Flag this post
WhatsApp API flaw let researchers scrape 3.5B accounts
bleepingcomputer.comยท13hยท
๐Ÿ“ฐRSS Reading Practices
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.clubยท1d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.comยท1d
โœ…Format Validation
Flag this post
A Bayesian Analysis of Biblical Prophesies
madebynathan.comยท33mยท
Discuss: Hacker News
๐Ÿ“ŠHyperLogLog
Flag this post
Markdown Is Holding You Back
newsletter.bphogan.comยท12hยท
Discuss: Hacker News
๐Ÿ“‹Document Grammar
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.comยท1d
๐ŸŽฏNTLM Attacks
Flag this post
The AI Security Playbook: Match Your Testing to Your Maturity
hackerone.comยท2d
๐Ÿ”Capability Systems
Flag this post
Itโ€™s Not Always DNS: Exploring How Name Resolution Works
cefboud.comยท1dยท
Discuss: r/programming
๐ŸŒDNS Security
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.deยท2d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Integrity Policy - Monitoring and Enforcing the use of SRI
scotthelme.ghost.ioยท3d
๐Ÿš€Indie Hacking
Flag this post
Data Exfiltration in Claude for Excel
promptarmor.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Introducing Webhook Events for Alert Changes
socket.devยท1dยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
Flag this post