A Metal Detectorist Found Ancient Roman Coins—Then Hid Them From Authorities for 8 Years
popularmechanics.com·8h
🗝️Paleocryptography
Flag this post
UN member states sign cybercrime agreement despite industry, activist opposition
cybersecuritydive.com·6h
🛡Cybersecurity
Flag this post
Adding a Syslog Server to a netlab Lab Topology
blog.ipspace.net·15h
📊Homelab Monitoring
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.edu·12h
🌐DNS Security
Flag this post
Learning osquery
blog.devops.dev·8h
🔌Operating system internals
Flag this post
Quality of Coverage (QoC): A New Paradigm for Quantifying Cellular Network Coverage Quality, Usability and Stability
arxiv.org·17h
🕸️Network Topology
Flag this post
The Trojan Example: Jailbreaking LLMs through Template Filling and Unsafety Reasoning
arxiv.org·17h
🌐NetworkProtocols
Flag this post
Hard part about building AI Agents isn't planning it's making them stick to plan
⚡Proof Automation
Flag this post
Continuous profiling with Parca: finally seeing which functions burn CPU in prod
📊Performance Profiling
Flag this post
New to homelab - Just got Pi Hole running as my first project, and would like to dig a bit deeper into my outbound data
📡Network Monitoring
Flag this post
Mastering Lock-Free Data Structures in Go: Ring Buffers, Queues, and Performance Optimization
⚡Hardware Transactional Memory
Flag this post
Exploring Spiking Neural Networks for Binary Classification in Multivariate Time Series at the Edge
arxiv.org·17h
🧠Machine Learning
Flag this post
Environment-Dependent Components Identification of Behind-the-Meter Resources via Inverse Optimization
arxiv.org·17h
🧩WASM Components
Flag this post
How AI Search Solves the Problem of Working with Unstructured Data
👤Search Personalization
Flag this post
A new measure for dynamic leakage based on quantitative information flow
arxiv.org·17h
🕳️Information Leakage
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.co·5d
🛡️eBPF Security
Flag this post
Qilin Targets Windows Hosts With Linux-Based Ransomware
darkreading.com·6h
🎫Kerberos Exploitation
Flag this post
Loading...Loading more...