FFTY: Spectacular Returns In 2025 Mask Issues
seekingalpha.comยท1d
๐Ÿ”BitFunnel
Prime Portraits
archive.bridgesmathart.orgยท2d
๐Ÿ“Mathematical Art
How Wikimedia Commons is making microbiology open: lessons from Wikimedistas de Jujuy, Argentina
diff.wikimedia.orgยท10h
๐ŸฐManuscript Networks
Sharp Bilinear Filters: Big Clean Pixels for Pixel Art
bumbershootsoft.wordpress.comยท3h
๐ŸŒˆColor Archaeology
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.comยท1d
๐Ÿ”NTLM Forensics
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.comยท3d
๐Ÿ“บVT100
How to store ordered information in a Relational Database (2015)
softwareengineering.stackexchange.comยท2dยท
๐ŸงฎAlgebraic Datatypes
Kurzgesagt - In a Nutshell: AI Slop Is Destroying The Internet
dev.toยท11hยท
Discuss: DEV
๐Ÿ“ฐContent Curation
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Prompt Injection 2.0: The New Frontier of AI Attacks
dev.toยท3hยท
Discuss: DEV
๐ŸŽฏThreat Hunting
Laion, the dataset behind Stable Diffusion (2023)
deeplearning.aiยท17hยท
Discuss: Hacker News
๐ŸŽ“Academic Torrents
Hyper-Personalized Cyberbullying Mitigation via Adaptive Linguistic Fingerprinting and Behavioral Anomaly Detection
dev.toยท13hยท
Discuss: DEV
๐ŸŽ›๏ธFeed Filtering
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.toยท3hยท
Discuss: DEV
๐ŸงฎKolmogorov Bounds
High-Throughput Reactive Sputtering Process Optimization via Adaptive Machine Learning Control
dev.toยท8hยท
Discuss: DEV
๐Ÿ“„Document Digitization
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.comยท3d
๐Ÿ”BitFunnel
Automated Microfluidic Enrichment & Quantification of Exosomal ctDNA via Hybrid-Optic Nanoparticle Resonance Mapping
dev.toยท1dยท
Discuss: DEV
๐Ÿ“„Document Digitization
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.toยท19hยท
Discuss: DEV
๐Ÿ”—Supply Chain
Exposing Citation Vulnerabilities in Generative Engines
arxiv.orgยท2d
๐Ÿ“œDigital Philology