IT Security Weekend Catch Up â October 24, 2025
badcyber.com¡2d
đHacking
Flag this post
About
âšī¸Information Theory
Flag this post
Shifting from reactive to proactive: Cyber resilience amid nation-state espionage
cyberscoop.com¡2d
đ¯Threat Hunting
Flag this post
Topological Data Persistence Analysis for Anomaly Detection in Complex Network Systems
đŗī¸Persistent Homology
Flag this post
TURBOTEST: Learning When Less is Enough through Early Termination of Internet Speed Tests
arxiv.org¡1h
đ§ŽKolmogorov Complexity
Flag this post
Weekly Update 475
troyhunt.com¡1d
đēKerberos Archaeology
Flag this post
ashishps1/awesome-system-design-resources
github.com¡1d
đĄNetwork Protocol Design
Flag this post
Programming as the New Latin: How Code Creates a Digital Knowledge Elite
đMedieval Computing
Flag this post
Feed-forward active magnetic shielding
arxiv.org¡1h
đ§˛Magnetic Resonance
Flag this post
Show HN: CVE Daily â fast, vendor-neutral CVE briefs for triage
đŖZIP Vulnerabilities
Flag this post
Shift Bribery over Social Networks
arxiv.org¡1h
đFeed Algorithms
Flag this post
Design for Learning
đ˛Cellular Automata
Flag this post
Leverage Unlearning to Sanitize LLMs
arxiv.org¡1h
đģLocal LLMs
Flag this post
NeuroGenPoisoning: Neuron-Guided Attacks on Retrieval-Augmented Generation of LLM via Genetic Optimization of External Knowledge
arxiv.org¡1h
đģLocal LLMs
Flag this post
Genie, Take the Wheel
đCode Metrics
Flag this post
Shoot First, Ask Questions Later? Building Rational Agents that Explore and Act Like People
arxiv.org¡1h
đ˛Cellular Automata
Flag this post
Loading...Loading more...