intelligence agencies, political science, international relations, security services

Digital transformation of intelligence in Denmark. An interview with Anja Dalgaard-Nilsen
tandfonline.com·1d
🔐Swedish Cryptography
Physics-informed AI excels at large-scale discovery of new materials
phys.org·4h
🧠Machine Learning
EU to investigate Hungarian spy ring that targeted Brussels institutions
rfi.fr·4h
🔎OSINT Techniques
From Keywords to Clusters: AI-Driven Analysis of YouTube Comments to Reveal Election Issue Salience in 2024
arxiv.org·15h
📊Feed Optimization
My Cognitive Dissonance
studium.dev·2d·
Discuss: Hacker News
🚀Indie Hacking
SIEM vs SOAR: The Key Differences for Modern Security Teams
securityscorecard.com·3h
🚨Incident Response
Archaeologists Found a 2,500-Year-Old Tomb Filled with Treasure—and Completely Untouched
popularmechanics.com·5h
🗝️Paleocryptography
Foreign Secretary refuses to say if she saw dossier branding China a ‘threat’
the-independent.com·8h
🔐Soviet Cryptography
LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
sentinelone.com·1d
🎯Threat Hunting
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·3h
📊Homelab Monitoring
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.com·6h
🛡Cybersecurity
CAPIF 4: Grounded in IPv6, Looking to Orbit
labs.ripe.net·7h
📡BGP Archaeology
If Anyone Builds It, Everyone Dies: my review
haggstrom.blogspot.com·6h·
🔲Cellular Automata
Threat Intelligence Report: Daejeon NIRS Data Center Fire Potential DPRK APT Nexus
krypt3ia.wordpress.com·3d
🎯Threat Hunting
RUSSIAN INTERNET INFRASTRUCTURE IN THE AGE OF DIGITAL SOVEREIGNTY AND INFRASTRUCTURAL COERCION: THE CASE OF TSPU
criticalinfralab.net·12h
🖥️Self-hosted Infrastructure
Study Finds Over 77% of Mobile Apps Leak Sensitive Data and Pose Privacy Risks
zimperium.com·6h
🛡Cybersecurity
MIT ‘Cannot Support’ Trump’s Compact—First University To Reject Funding Deal
forbes.com·1h
🐧FOSS