Announcing the 2025 NDSA Excellence Award Winners
ndsa.org·1d
🏛️PREMIS Metadata
A new information-theory framework reveals when multi-agent AI systems truly work as a team
the-decoder.com·3h
🔲Cellular Automata
What is Mobile Threat Defense (MTD)?
jamf.com·2d
🎯Threat Hunting
Planning Out My First Home Server/Camera System
i.redd.it·9h·
Discuss: r/homelab
🏠HomeLab
SonicWall Breach Exposes All Cloud Backup Customers' Firewall Configs
it.slashdot.org·15h
🔓Hacking
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.com·22h
🔍Vector Forensics
Software Architecture Horror Story
blog.mihaisafta.com·5h·
Discuss: Hacker News
🔌Interface Evolution
Open Lineage
usenix.org·1d
🔌Interface Evolution
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
A Manifesto for the Programming Desperado
github.com·21h·
Discuss: Hacker News
💻Programming languages
Building A Real-Time Communication System Using Go and WebSocket
dev.to·17h·
Discuss: DEV
🌐WebSocket Framing
Bidirectional type checking step by step (in Ruby)
luizpvas.github.io·14h·
Discuss: Hacker News
Bidirectional Typing
Building a Streaming Data Pipeline with Kafka and Spark: Real-Time Analytics Implementation Guide
dev.to·1d·
Discuss: DEV
🌊Apache Kafka
SIEM vs SOAR: The Key Differences for Modern Security Teams
securityscorecard.com·21h
🚨Incident Response
A small number of samples can poison LLMs of any size
dev.to·1d·
Discuss: DEV
💻Local LLMs
Building Self-Correcting Database Agents with Meta's Llama-4-Scout: From Natural Language to SQL Insights
dev.to·1d·
Discuss: DEV
🗄️Database Internals
1Password might just have a solution to the password security problem posed by AI agents
techradar.com·2d
Proof Automation
You don't need an AI agent framework, or why frameworks are the new Juicero
konvu.com·3d·
Discuss: Hacker News
🔬Refinement Types
AI-Driven Ethical Risk Assessment & Mitigation in Supply Chain Compliance
dev.to·9h·
Discuss: DEV
🔗Supply Chain
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·4d
🎫Kerberos Attacks