Amazon Explains How Its AWS Outage Took Down the Web
wired.com·1d
👁️Observatory Systems
Flag this post
Show HN: Catflap Prey Detector
🏠Home Automation
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
MIT 6.851: Advanced Data Structures (Spring'21)
💻CS
Flag this post
Shifting from reactive to proactive: Cyber resilience amid nation-state espionage
cyberscoop.com·2d
🎯Threat Hunting
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·1h
🎫Kerberos Exploitation
Flag this post
Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
news.risky.biz·2h
🔓Hacking
Flag this post
Mitigating Aggressive Crawler Traffic in the Age of Generative AI: A Collaborative Approach from the University of North Carolina at Chapel Hill Libraries
journal.code4lib.org·5d
🎯Threat Hunting
Flag this post
Hackaday Links: October 26, 2025
hackaday.com·5h
👁️Observatory Systems
Flag this post
Myanmar Military Shuts Down a Major Cybercrime Center and Detains Over 2,000 People
yro.slashdot.org·1d
🛡Cybersecurity
Flag this post
IT Security Weekend Catch Up – October 24, 2025
badcyber.com·2d
🔓Hacking
Flag this post
Show HN: Go SYN Scanner – 21k Hosts in Under 1s
🔍eBPF
Flag this post
Rebuilding Search: Velocity Unlocks Correctness, Not the Other Way Around
⚙️Build Archaeology
Flag this post
TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection
arxiv.org·39m
🗜️LZW Variants
Flag this post
The Evolving Battlefield: AI vs. AI in Network Security by Arvind Sundararajan
🎯Threat Hunting
Flag this post
ashishps1/awesome-system-design-resources
github.com·1d
📡Network Protocol Design
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·39m
🧮Algebraic Datatypes
Flag this post
Loading...Loading more...