From Ransom to Revenue Loss
paloaltonetworks.comยท1d
๐ŸšจIncident Response
Working for a Vendor with David Gee
blog.ipspace.netยท1d
๐ŸงฒRISC-V Archaeology
Scientists develop end-to-end encryption for git services
techxplore.comยท17hยท
Discuss: Hacker News
๐Ÿ“ฆContent Addressable
Intelligent Search in Rails with Typesense
avohq.ioยท6hยท
Discuss: Hacker News
๐ŸŽฏGradual Typing
Show HN: CodexLocal โ€“ Offline, Privacy-First AI Coding Tutor (WebLLM and RAG)
codexlocal.comยท20hยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
Real-Time AI-Powered DDoS Detection
timeplus.comยท22hยท
Discuss: Hacker News
๐Ÿ•ต๏ธNetwork Forensics
CNL: Prioritising Unpatched CVEs in the Kubernetes Ecosystem
youtube.comยท18h
๐Ÿ“ฆContainer Security
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.ioยท1dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
digital-asset/cn-quickstart
github.comยท12h
๐Ÿ”„Sync Engine
A Developerโ€™s Deep Dive with Python
dev.toยท4dยท
Discuss: DEV
๐Ÿ”CBOR
5 Signs Your Business Is a Prime Target for Cyberattacks
kdnuggets.comยท1d
๐Ÿ”“Hacking
Devoxx: MCP in the Wild: Real Time Agentic Systems with Live AB Testing by Arun Gupta
dev.toยท1hยท
Discuss: DEV
๐ŸŒProtocol Synthesis
Proofs of quantum memory
arxiv.orgยท1d
โš›๏ธQuantum Tape
Meanwhile, Bitcoin Life Insurer, Secures $82M to Meet Soaring Demand For Inflation-Proof Savings
hackernoon.comยท18h
๐Ÿ”BitFunnel
Adapting Insider Risk mitigations for Agentic Misalignment: an empirical study
arxiv.orgยท10h
๐Ÿ•ต๏ธVector Smuggling
Statistical Analysis Using NumPy and SciPy: A Practical Guide
dev.toยท6hยท
Discuss: DEV
๐Ÿ“Linear Algebra
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.toยท3hยท
Discuss: DEV
๐Ÿ“ŠMulti-vector RAG
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.orgยท2d
๐Ÿ”งHardware Verification
We found a bug in Go's ARM64 compiler
blog.cloudflare.comยท29mยท
Discuss: Hacker News
๐Ÿ“œProof Carrying Code
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.orgยท1d
๐Ÿ•ต๏ธVector Smuggling