Looking for Alicia
nybooks.comยท7h
๐Ÿ”Soviet Cryptography
How this seasoned bug bounty hunter combines Burp Suite and HackerOne to uncover high-impact vulnerabilities
portswigger.netยท2d
๐Ÿ”“Hacking
Migrating from docker to podman
codito.inยท20h
๐Ÿ“ฆContainer Security
September Patch Tuesday handles 81 CVEs
news.sophos.comยท4d
๐Ÿ’ฃZIP Vulnerabilities
What are the AI privacy concerns?
proton.meยท3d
๐Ÿ”’Privacy Archives
Understanding Floating-Point Numbers
dennisforbes.caยท2dยท
Discuss: Hacker News
๐Ÿ“Arithmetic Precision
How to recreate Navan's receipt scan feature to retrieve the total amount
blog.yasuflores.meยท3dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Zoomโ€™s Boom Days Are Over. What Comes Next?
nytimes.comยท18h
โณTime Capsule Networks
Don't Build an Audience
humaninvariant.comยท2dยท
Discuss: Hacker News
๐Ÿ“กRSS Readers
Man released in probe into Creeslough service station explosion
the-independent.comยท1d
๐ŸšจIncident Response
Show HN: AI Image Editor with Natural Language Commands
imagable.aiยท3dยท
Discuss: Hacker News
๐Ÿ“ธPNG Optimization
NPM debug and chalk packages compromised
aikido.devยท6dยท
๐ŸบZIP Archaeology
Appleโ€™s A17 Pro Chip: Critical Flaw Causes Dual Subsystem Failure & Forensic Log Loss
seclists.orgยท6d
๐Ÿ”’Hardware Attestation
Async Web Scraping with scrapy_cffi
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธFeed Discovery
LangChain for EDA: Build a CSV Sanity-Check Agent in Python
towardsdatascience.comยท5d
โšกProof Automation
**Master Python Memory Management: 8 Essential Optimization Techniques for Performance**
dev.toยท5dยท
Discuss: DEV
๐Ÿง Memory Allocators
Show HN
github.comยท1dยท
๐ŸŒณIncremental Parsing
How DevOps tools are opening the gates for high-profile cyberattacks
techradar.comยท2d
๐Ÿ”“Hacking
Dynamic Structural Recovery Parameters Enhance Prediction of Visual Outcomes After Macular Hole Surgery
arxiv.orgยท2d
๐Ÿ“Projective Geometry