The Ghost Cursor
thedailywtf.comยท12h
๐Hacking
Flag this post
SEC Consult SA-20251027-0 :: Unauthenticated Local File Disclosure in MPDV Mikrolab MIP 2 / FEDRA 2 / HYDRA X Manufacturing Execution System #CVE-2025-12055
seclists.orgยท1d
๐CBOR
Flag this post
Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details
๐Hacking
Flag this post
A Short Introduction to Categorical Logic
youtube.comยท14h
๐Category Theory
Flag this post
Ejabberd 25.10 / ProcessOne โ Erlang Jabber/XMPP/Matrix Server โ Communication
๐ฆDeflate
Flag this post
Reverie: An ergonomic and safe syscall interception framework for Linux
๐ฉSystems Programming
Flag this post
The True Guide to Omniscience And Why Everyone Lies to You About Knowledge
hackernoon.comยท13h
๐Shell Calculus
Flag this post
A Beginnerโs Guide to Channel Attribution Modeling in Marketing Using Markov Chains, with a Case Study in R
๐Feed Optimization
Flag this post
Gmail breach panic? Itโs a misunderstanding, not a hack
malwarebytes.comยท1d
๐Hacking
Flag this post
Comparative Analysis of Data Augmentation for Clinical ECG Classification with STAR
arxiv.orgยท14h
๐ง Machine Learning
Flag this post
U.S. CISA adds Dassault Systรจmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐กCybersecurity
Flag this post
The Silent Killer of AI Projects: How to Tackle Hidden Costs and Optimize Your LLM Spend
โ๏ธBatch Processing
Flag this post
Callback the Police: Enforcing Business Rules in AI Agents ๐ฎโโ๏ธ
โจAlgebraic Effects
Flag this post
From Medical Records to Diagnostic Dialogues: A Clinical-Grounded Approach and Dataset for Psychiatric Comorbidity
arxiv.orgยท14h
๐ตAudio ML
Flag this post
Telco provider used by US government and others hit by nation-state hackers
techradar.comยท3h
๐จIncident Response
Flag this post
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
rapid7.comยท1d
๐ฏThreat Hunting
Flag this post
Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia
securityaffairs.comยท8h
๐กCybersecurity
Flag this post
Loading...Loading more...