How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.com·17h
🌊Streaming Systems
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·6h·
Discuss: Hacker News
🎯Threat Hunting
NEWS ROUNDUP – 8th October 2025
digitalforensicsmagazine.com·2d
🔗Data Provenance
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·17h·
Discuss: Hacker News
🔢Reed-Solomon Math
April 2025 Blackout Report
entsoe.eu·1d·
Discuss: Hacker News
🛡️eBPF Programs
Stealth Legal tech startup looking for Head of Eng
25madison-llc.breezy.hr·1h·
Discuss: Hacker News
Proof Automation
Building Resilient Operations Through ITIL-Based Incident Management
hackernoon.com·2d
🔓Hacking
A major evolution of Apple Security Bounty
security.apple.com·7h·
Discuss: Hacker News
🛡️RISC-V Security
6th October – Threat Intelligence Report
research.checkpoint.com·4d
🛡Cybersecurity
Rubygems.org AWS Root Access Event – September 2025
rubycentral.org·23h·
🏺Kerberos Archaeology
CubicLog – A single-binary logging server with zero-config smart analytics
github.com·19h·
Discuss: Hacker News
📝Log Parsing
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·2h
🌐DNS Security
10 Data + AI Observations for Fall 2025
towardsdatascience.com·3h
🌊Stream Processing
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
krebsonsecurity.com·1h·
Discuss: Hacker News
🌐DNS Security
Getting a Hypergraph of Functions to a Browser
systeminit.com·1d·
Discuss: Hacker News
📐E-graphs
Dozens of Oracle customers impacted by Clop data theft for extortion campaign
cyberscoop.com·1d
🔓Hacking
Here’s the tech powering ICE’s deportation crackdown
techcrunch.com·2d
🕵️Network Forensics
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.security·20h
🛡️eBPF Security
Forensic Focus Digest, October 10 2025
forensicfocus.com·6h
📊Spectrograms