Announcing the 2025 NDSA Excellence Award Winners
ndsa.org·14h
🏛️PREMIS Metadata
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
What is Mobile Threat Defense (MTD)?
jamf.com·1d
🎯Threat Hunting
ASP.NET Core 9 Essentials • Albert Tanure & Rafael Herik de Carvalho • GOTO 2025
youtube.com·1d
🌐WASI
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.com·12h
🔍Vector Forensics
The Day I Hacked XCTrack
blog.syrac.org·12h·
Discuss: Hacker News
🔐PKI Archaeology
Man-in-the-Middle Detection
infosecwriteups.com·1d
🎯Threat Hunting
rule-router: I built a high-performance rule engine for NATS in Go
reddit.com·1d·
Discuss: r/golang
🌊Streaming Systems
🐼 Pandas DataFrame Selection, Filtering & Cleaning — Hands-on Practice.
dev.to·8h·
Discuss: DEV
📐Linear Algebra
RecGen: a powerful tool to create recommendation systems
dev.to·12h·
Discuss: DEV
🔗Constraint Handling
Can AI Co-Design Distributed Systems? Scaling from 1 GPU to 1k
harvard-edge.github.io·4h·
Discuss: Hacker News
🎯Performance Proofs
The A.I. Prompt That Could End the World
nytimes.com·17h·
Discuss: Hacker News
Proof Automation
Nearest Neighbor CCP-Based Molecular Sequence Analysis
arxiv.org·22h
🔄Burrows-Wheeler
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Building a Universal Webhook Adapter in Go: Introducing WHOOK
dev.to·10h·
Discuss: DEV
🌐WASI
A Deal with the Devil? Free VPNs still widespread across the UK
techradar.com·13h
🛣️BGP Hijacking
Malicious NPM Packages Host Phishing Infrastructure Targeting 135
socket.dev·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
Debugging Humidity: Lessons from deploying software in the physical world
physical-ai.ghost.io·6h·
Discuss: Hacker News
🛡️Error Boundaries
Quantum-Aware Symbolic Defense System
dev.to·1d·
Discuss: DEV
🔐Cryptographic Archaeology