Celebrating 10 Years of Our Most Popular Blog Post
fsuspecialcollections.wordpress.com¡14h
📰RSS Archaeology
Flag this post
High school student surrounded by police and handcuffed after AI mistakes his bag of Doritos for a gun
techspot.com¡1d¡
Discuss: r/technews
🔓Hacking
Flag this post
OrthoRoute
bbenchoff.github.io¡1d
đŸ–Ĩī¸Terminal Renaissance
Flag this post
Corero Network Security Solves Encrypted DDoS Blind Spot for Service Providers and Enterprises
corero.com¡20h
🔓LDAP Injection
Flag this post
Large 7-Segment Displays
hackster.io¡8h
âš™ī¸DIY Electronics
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.be¡23h
🔐Cryptographic Archaeology
Flag this post
Precedent: US Agency Identifies Darknet Admin with ChatGPT Data
heise.de¡2d
🌐WARC Forensics
Flag this post
The New Calculus of AI-Based Coding
blog.joemag.dev¡1d¡
Discuss: Hacker News
🔄Reproducible Builds
Flag this post
Analysis by Claude of Mt. Gox's 2011 codebase
github.com¡2d¡
Discuss: Hacker News
đŸ§ŦPostgreSQL Forensics
Flag this post
BSI: Checklist for action in case of compromised accounts
heise.de¡19h
🔓Hacking
Flag this post
Cisco opensourced MCP-Scanner for finding vulnerabilties in MCP server
github.com¡1d¡
Discuss: Hacker News
🏠Homelab Pentesting
Flag this post
Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa
darkreading.com¡2h
🛡Cybersecurity
Flag this post
Show HN: Pinpam, TPM2-backed pin authentication for Linux
github.com¡1d¡
Discuss: Hacker News
🔒Hardware Attestation
Flag this post
Artificial Intelligence Based Predictive Maintenance for Electric Buses
arxiv.org¡4h
🧠Machine Learning
Flag this post
Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method
arxiv.org¡6d
🌸Bloom Variants
Flag this post
UGAE: Unified Geometry and Attribute Enhancement for G-PCC Compressed Point Clouds
arxiv.org¡1d
📐Geometric Hashing
Flag this post
Microsoft Releases AI Call Center Stack with Voice, SMS, and Memory
github.com¡1d¡
Discuss: Hacker News
đŸŽ™ī¸Whisper
Flag this post
Attackers Sell Turnkey Remote Access Trojan 'Atroposia'
darkreading.com¡1d
🔓Hacking
Flag this post
Energy-Efficient UAV-Enabled MEC Systems: NOMA, FDMA, or TDMA Offloading?
arxiv.org¡1d
â„šī¸Information Theory
Flag this post
TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection
arxiv.org¡2d
đŸ—œī¸LZW Variants
Flag this post