Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·18h
🇸🇪Swedish Cryptanalysis
Intimate conversations with AI chatbots were visible to everyone
heise.de·14h
🔓Hacking
Metasploit Wrap Up 10/09/2025
rapid7.com·2d
🛡️eBPF Security
Multitasking makes you more likely to fall for phishing emails, experiments show
phys.org·10h
🎯Threat Hunting
Westin's Four States of Privacy
marcusolsson.dev·2d·
Discuss: Hacker News
🔒Privacy Archives
Discord hack shows risks of online age checks
news.sky.com·8h·
Discuss: Hacker News
🛡Cybersecurity
Hacking a Game Boy Emulator to Output MIDI to Multiple Hardware Synths
dr-schlange.github.io·7h·
Discuss: Hacker News
🎮Gameboy Emulation
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·18h·
Discuss: Hacker News
🔗Data Provenance
Random samples from a tetrahedron
johndcook.com·15h
💎Information Crystallography
C++ Reflection and Qt MOC
wiki.qt.io·3d·
Discuss: Hacker News
🧩WASM Modules
From Passwords to Passkeys
ssg.dev·3d·
Discuss: Hacker News
🔓Hacking
End-to-end testing of Gen AI Apps
dev.to·15h·
Discuss: DEV
🔍Concolic Testing
Advanced Multiphase Flow Characterization via Hybrid Acoustic-Optical Tomography
dev.to·3h·
Discuss: DEV
🏺Computational Archaeology
Get RICH or Die Scaling: Profitably Trading Inference Compute for Robustness
arxiv.org·2d
🧠Intelligence Compression
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·3d
🔍eBPF
Neural Networks from Scratch in Python: Simpler Than You Think
hamza.se·1d·
Discuss: Hacker News
📊Quantization
From Clicks to Code: Building a Production‑Ready EVM Transaction Client (Approve, Mint, Swap, EIP‑1559)
dev.to·2d·
Discuss: DEV
Format Verification
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.to·1h·
Discuss: DEV
📊Multi-vector RAG
Computational Complexity of Covering Two-vertex Multigraphs with Semi-edges
arxiv.org·2d
🕸️Graph Algorithms
Sync PUBG and Hardware IDs
github.com·16h·
Discuss: Hacker News
🔒Hardware Attestation