Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.com·19h
🇸🇪Swedish Cryptanalysis
Strengthening national cyber resilience through observability and threat hunting
ncsc.gov.uk·3d
🎯Threat Hunting
Sales pitch about why you should learn statistics
minireference.com·1d
🧠Intelligence Compression
Welcome to LIL’s Data.gov Archive Search
lil.law.harvard.edu·1d
💾Data Preservation
The artificial complexity of OOXML files (the PPTX case)
blog.documentfoundation.org·1d·
Discuss: Hacker News
📟Terminal Typography
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.in·19h·
Discuss: Hacker News
🔗Data Provenance
OpenAI's inflated valuation, as I understand it
taloranderson.com·1d·
Discuss: Hacker News
💻Local LLMs
Stop Worrying and Love the Bomb
bitbytebit.substack.com·14h·
Discuss: Substack
⚙️Build Archaeology
Building the Reasoning Engine at Axiom
axiommath.ai·1d·
Discuss: Hacker News
⚔️Lean Tactics
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·1d·
Discuss: Hacker News
🦀Rust Macros
OpenAI Aims To Make ChatGPT the Operating System of the Future
thenewstack.io·1d
🔓Open Source Software
Emerging technologies and national security intelligence
tandfonline.com·19h
🔐Capability Systems
Programmer in Wonderland
binaryigor.com·2d·
Discuss: Hacker News
🔩Systems Programming
Phishing Protection: Tools SOC Teams Trust in 2025 – An Ultimate Guide
vmray.com·4d
🎯Threat Hunting
Show HN: An open-source starter kit for implementing OWASP ASVS 5.0
github.com·1d·
Discuss: Hacker News
🔓Open Source Software
U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·1d
🛡Cybersecurity
Analysis of Python Web Development Challenges
dev.to·10h·
Discuss: DEV
🎬WebCodecs API
Securing LangChain APIs with AWS SSO and Active Directory
dev.to·2d·
Discuss: DEV
🏠Homelab Automation
Deep Learning-Driven Spatial Tau Oligomer Profiling for Early Alzheimer's Diagnosis
dev.to·13h·
Discuss: DEV
🔍Vector Forensics