TRIM: Token-wise Attention-Derived Saliency for Data-Efficient Instruction Tuning
arxiv.org·5h
🔨Compilers
Hacking the Humane AI Pin
writings.agg.im·20h·
Discuss: Hacker News
🛡️ARM TrustZone
The Dwarves Beneath the Kernel: Forging BTF for eBPF
bootlin.com·20h
📺VT100
Memory fragmentation? leak? in Rust/Axum backend
reddit.com·1d·
Discuss: r/rust
🦀Embedded Rust
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.com·19h
🧪Binary Fuzzing
Souvenir
deprogrammaticaipsum.com·3d
🔩Systems Programming
The Next Computing Revolution: Bringing Processing Inside Memory
computer.org·2d·
Discuss: Hacker News
Hardware Transactional Memory
Key Takeaways from the Safety Critical Track at Open Source Summit Europe 2025 – 3
elisa.tech·2h
🔓Open Source Software
Tips for C Programming from Nic Barker
hackaday.com·1d
🔩Systems Programming
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.com·1d
📦Container Security
What is Mobile Threat Defense (MTD)?
jamf.com·1h
🎯Threat Hunting
VMRay SentinelOne Integration Delivers Full Threat Context
vmray.com·1d
👁️Observatory Systems
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·2d
🔐Cryptographic Archaeology
Memory leaks: the forgotten side of web performance (2022)
nolanlawson.com·1d·
Discuss: Hacker News
🧠Memory Forensics
Latency vs. Accuracy for LLM Apps — How to Choose and How a Memory Layer Lets You Win Both
dev.to·1d·
Discuss: DEV
Performance Mythology
Imagery HTB WriteUp: Season 9 Machine 2
infosecwriteups.com·33m
📟Terminal Forensics
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·15h·
Discuss: Hacker News
🔓Reverse engineering
We found a bug in Go's ARM64 compiler
blog.cloudflare.com·20h·
📜Proof Carrying Code