Agentic AI introduces new security challenges in era of MCP and A2A
techradar.com·19h
🔐Capability Systems
Flag this post
Making a Virtual Machine Look like Real Hardware to Malware
hackaday.com·8h
🕸️WebAssembly
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·23h
🎯NTLM Attacks
Flag this post
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
securelist.com·7h
🚀Indie Hacking
Flag this post
The tricky science of Internet measurement
blog.cloudflare.com·21h·
Discuss: Hacker News
📡Network Archaeology
Flag this post
Quantum computers may open horizons but unlock our worst secrets
thetimes.com·1d·
Discuss: Hacker News
🔐Quantum Security
Flag this post
Emu68 Goes PowerPC
patreon.com·5h·
Discuss: Hacker News
Homebrew CPUs
Flag this post
Microsoft 365 Copilot – Arbitrary Data Exfiltration via Mermaid Diagrams
dev.to·1d·
Discuss: DEV
🔓Hacking
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.org·6h
🔍Vector Forensics
Flag this post
JS/TS Functions Orchestrator
github.com·23h·
Discuss: Hacker News
🔗Concatenative Programming
Flag this post
SABlock: Semantic-Aware KV Cache Eviction with Adaptive Compression Block Size
arxiv.org·6h
📄Text Chunking
Flag this post
Think Twice: Branch-and-Rethink Reasoning Reward Model
arxiv.org·6h
Incremental Computation
Flag this post
Multitask Multimodal Self-Supervised Learning for Medical Images
arxiv.org·6h
🧠Machine Learning
Flag this post
InnoGate: Anti-Piracy Research Discovery Platform with AI-Powered RAG and Auth0 FGA
dev.to·1d·
Discuss: DEV
🔌Archive APIs
Flag this post
Distroless Containers for Corporate Use: Nix Flakes vs. Fedora
blog.riemann.cc·1d·
❄️Nix Adoption
Flag this post
Adaptive Transformer Architecture Optimization via Hyper-parameter Exploration and Reinforcement Learning
dev.to·11h·
Discuss: DEV
Z3 Optimization
Flag this post
GCAO: Group-driven Clustering via Gravitational Attraction and Optimization
arxiv.org·6h
🌊Spectral Clustering
Flag this post
TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection
arxiv.org·1d
🗜️LZW Variants
Flag this post
Tuesday 4 November 2024
informatics.ed.ac.uk·1d
🧠Machine Learning
Flag this post