Directory Investigation, Authentication Analysis, Enterprise Security, Schema Mining

An enough week
blog.mitrichev.ch·1d·
📈Linear programming
Codeminer42 Dev Weekly #82
blog.codeminer42.com·6h
🎯Gradual Typing
A disenshittification moment from the land of mass storage
doctorow.medium.com·11h
🧲Magnetic Philosophy
Computer vision AI VTI’s against Phishing
vmray.com·2d
👁️Perceptual Hashing
Unlock Your Enterprise Data: A Java/Spring Guide to AI-Ready Schema.org & JSON-LD
dev.to·1d·
Discuss: DEV
📋Document Grammar
Preventing Internet Route Hijack with SIDRops Technology
ietf.org·2d
🛣️BGP Hijacking
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·8h
📊Homelab Monitoring
Navigating the Vast AI Security Tools Landscape
optiv.com·1d
🎯Threat Hunting
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·9h
🔓Hacking
Autonomous AI Hacking and the Future of Cybersecurity
schneier.com·12h·
Discuss: Hacker News
🎯Threat Hunting
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.org·1d
🛡Cybersecurity
Att&Df: Update the Operating System's "Dead Drop"
zenodo.org·1d·
Discuss: Hacker News
🛡️eBPF Security
YouTube gets ~5% CTR lift on Shorts by replacing embedding tables with Semantic IDs
shaped.ai·23h
📊Feed Optimization
Automated Anomaly Detection in Time-Series Statistical Spreadsheets via Hyperdimensional Vector Similarity
dev.to·2h·
Discuss: DEV
🔤Character Classification
How I found an unauthenticated goldmine of PII
infosecwriteups.com·11h
🔓Hacking
Stealth Legal tech startup looking for Head of Eng
25madison-llc.breezy.hr·7h·
Discuss: Hacker News
Proof Automation
The Death of the Curious Developer
hackernoon.com·18h
🧭Content Discovery
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·19h
🔗Graph Isomorphism
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·6h·
Discuss: Hacker News
🚀Indie Hacking
A small number of samples can poison LLMs of any size
anthropic.com·1d·
🔍Vector Forensics