PoC for Critical Lua Engine Vulnerabilities in Redis 7.4.5
redrays.io·7h·
Discuss: Hacker News
🧪CBOR Fuzzing
FBI takes down BreachForums portal used for Salesforce extortion
bleepingcomputer.com·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
A Year of Gentoo
arch.dog·1d·
Nix
Code Tours as Code
dundalek.com·2d·
Discuss: Hacker News
⚙️Build Archaeology
Walrus, A 1M ops/sec, 1 GB/s Write Ahead Log in Rust
nubskr.com·4d·
💿ZFS Internals
A Primer on Memory Consistency and Cache Coherence, Second Edition
link.springer.com·6d·
Discuss: r/programming
Cache Coherence
Ubuntu Engineering in 2025: A Retrospective
jnsgr.uk·3d·
Discuss: Hacker News
🔌Operating system internals
Red Hat will begin to integrate even further into IBM. About to get into enshittification?
reddit.com·10h·
Discuss: r/linux
🐧FOSS
Java Backend Coding Technology: Writing Code in the Era of AI #Version 1.1
dev.to·5d·
Discuss: DEV
SMT Applications
Memgoose – An In-Memory Mongoose Impersonator
github.com·18h·
Discuss: Hacker News
🔄Sync Engine
Generalized Orders of Magnitude (GOOMs)
github.com·12h·
Discuss: Hacker News
🕸️Tensor Networks
How Comet Browser Transformed My Machine Learning Workflow (And Why Every Developer Should Try It)
dev.to·8h·
Discuss: DEV
🌊Streaming Algorithms
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.to·1d·
Discuss: DEV
📊Multi-vector RAG
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.to·1d·
Discuss: DEV
🎵Audio ML
A Detailed Workflow for Creating an MCP Server that Returns MySQL Schema Information Using Vibe Coding
dev.to·3d·
Discuss: DEV
🗄️Database Internals
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·1d
🎫Kerberos Attacks
Tying It All Together: Your Map to Better Go Architecture
dev.to·2d·
Discuss: DEV
📊Dependency Graphs
Building with Agents, Not Code
basisset.com·2d·
Discuss: Hacker News
Proof Automation
AI Guardrails, Gateways, Governance Nightmares
go.mcptotal.io·1d·
Discuss: Hacker News
🎯Threat Hunting
Automated Anomaly Detection in Account Takeover via Multi-Modal Graph Neural Network Fusion
dev.to·23h·
Discuss: DEV
🔍Vector Forensics