How scammers use your data to create personalized tricks that work
malwarebytes.comยท3d
๐Ÿ”—Binary Similarity
Flag this post
Weekly Update 476
troyhunt.comยท2h
๐ŸŒณArchive Merkle Trees
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2d
๐Ÿ”“Hacking
Flag this post
Jackknife Transmittance and MIS Weight Estimation
momentsingraphics.deยท1dยท
Discuss: Hacker News
๐ŸŒˆColor Archaeology
Flag this post
Making Every 5x5 Nonogram: Part 1
patreon.comยท2dยท
Discuss: Hacker News
๐ŸงฎZ3 Solver
Flag this post
Engineering a Rust optimization quiz
fasterthanli.meยท1d
๐Ÿฆ€Rust Macros
Flag this post
Absurd Workflows: Durable Execution With Just Postgres
lucumr.pocoo.orgยท10hยท
๐ŸŒŠStreaming Databases
Flag this post
Show HN: AI tool to scan internal docs for GDPR violations before audits
news.ycombinator.comยท3dยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.comยท4dยท
Discuss: Hacker News
๐ŸบZIP Archaeology
Flag this post
Writing a DOS Clone in 2019
medium.comยท6hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
Conduent January 2025 breach impacts 10M+ people
securityaffairs.comยท2h
๐Ÿ›กCybersecurity
Flag this post
๐Ÿง  Mastering Goroutines in Go: The Power of Lightweight Concurrency.
dev.toยท1hยท
Discuss: DEV
๐Ÿ”ฉSystems Programming
Flag this post
Bright Data vs Browse AI: Choosing the Right Web Scraping Stack Without Regret
dev.toยท19hยท
Discuss: DEV
๐Ÿ’พPersistence Strategies
Flag this post
InertialAR: Autoregressive 3D Molecule Generation with Inertial Frames
arxiv.orgยท5h
๐ŸŒ€Riemannian Computing
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgยท5d
๐ŸŒŠStream Ciphers
Flag this post
Spiking Neural Networks: The Future of Brain-Inspired Computing
arxiv.orgยท5h
๐Ÿ”ฒCellular Automata
Flag this post
Idor โ€” TryHackMe writeup
infosecwriteups.comยท3d
๐ŸŒDNS Security
Flag this post