Promise based Web Worker Messaging
muffinman.ioΒ·1d
πStream Processing
Flag this post
Recent Vulnerabilities in Redis Serverβs Lua Scripting Engine
offsec.comΒ·19h
π«Kerberos Exploitation
Flag this post
D.J. Bernstein: The Good News Archive
πHacking
Flag this post
βTruffleNetβ Attack Wields Stolen Credentials Against AWS
darkreading.comΒ·1d
π«Kerberos Attacks
Flag this post
AI Models Write Code with Security Flaws 18β50% of the Time, New Study Finds
πCode Metrics
Flag this post
Understanding LangChain and LangGraph: A Beginnerβs Guide to AI Workflows
ποΈWhisper
Flag this post
Accumulating Context Changes the Beliefs of Language Models
arxiv.orgΒ·7h
π€Grammar Induction
Flag this post
Zero-RAG: Towards Retrieval-Augmented Generation with Zero Redundant Knowledge
arxiv.orgΒ·7h
πInformation Retrieval
Flag this post
Automatic Minds: Cognitive Parallels Between Hypnotic States and Large Language Model Processing
arxiv.orgΒ·7h
β¨Effect Systems
Flag this post
pg_stat_plans: Track per-plan call counts, execution times and EXPLAIN texts
π§¬PostgreSQL Forensics
Flag this post
Wavelet-Based Feature Extraction and Unsupervised Clustering for Parity Detection: A Feature Engineering Perspective
arxiv.orgΒ·7h
πInformation Crystallography
Flag this post
From Evidence to Verdict: An Agent-Based Forensic Framework for AI-Generated Image Detection
arxiv.orgΒ·7h
πVector Forensics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
πQuantum Security
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgΒ·7h
πLanguage Evolution
Flag this post
Show HN: KeyLeak Detector β Scan websites for exposed API keys and secrets
π¦ Malware Analysis
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
πStreaming Systems
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·1d
πHash Chains
Flag this post
Loading...Loading more...