The Ghost Cursor
thedailywtf.comยท12h
๐Ÿ”“Hacking
Flag this post
Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details
404media.coยท3hยท
Discuss: r/Android
๐Ÿ”“Hacking
Flag this post
A Short Introduction to Categorical Logic
youtube.comยท14h
๐Ÿ”€Category Theory
Flag this post
Ejabberd 25.10 / ProcessOne โ€“ Erlang Jabber/XMPP/Matrix Server โ€“ Communication
process-one.netยท22hยท
Discuss: Hacker News
๐Ÿ“ฆDeflate
Flag this post
Why Foundation Models in Pathology Are Failing
rewire.itยท21hยท
Discuss: Hacker News
๐Ÿ”Vector Forensics
Flag this post
Rust's std and parking_lot mutexes โ€“ who wins?
blog.cuongle.devยท3hยท
Discuss: Hacker News
๐Ÿฆ€Rust Verification
Flag this post
Building the Analytics Agent on Metabase: A Progress Report
medium.comยท17hยท
Discuss: Hacker News
๐Ÿ”„Schema Evolution
Flag this post
Reverie: An ergonomic and safe syscall interception framework for Linux
github.comยท23hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Flag this post
The True Guide to Omniscience And Why Everyone Lies to You About Knowledge
hackernoon.comยท13h
๐ŸšShell Calculus
Flag this post
A Beginnerโ€™s Guide to Channel Attribution Modeling in Marketing Using Markov Chains, with a Case Study in R
dev.toยท7hยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
Flag this post
Gmail breach panic? Itโ€™s a misunderstanding, not a hack
malwarebytes.comยท1d
๐Ÿ”“Hacking
Flag this post
Comparative Analysis of Data Augmentation for Clinical ECG Classification with STAR
arxiv.orgยท14h
๐Ÿง Machine Learning
Flag this post
U.S. CISA adds Dassault Systรจmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
Flag this post
The Silent Killer of AI Projects: How to Tackle Hidden Costs and Optimize Your LLM Spend
dev.toยท2dยท
Discuss: DEV
โš™๏ธBatch Processing
Flag this post
Callback the Police: Enforcing Business Rules in AI Agents ๐Ÿ‘ฎโ€โ™‚๏ธ
dev.toยท1dยท
Discuss: DEV
โœจAlgebraic Effects
Flag this post
From Medical Records to Diagnostic Dialogues: A Clinical-Grounded Approach and Dataset for Psychiatric Comorbidity
arxiv.orgยท14h
๐ŸŽตAudio ML
Flag this post
Telco provider used by US government and others hit by nation-state hackers
techradar.comยท3h
๐ŸšจIncident Response
Flag this post
Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence
rapid7.comยท1d
๐ŸŽฏThreat Hunting
Flag this post
Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia
securityaffairs.comยท8h
๐Ÿ›กCybersecurity
Flag this post