Reading the ENISA Threat Landscape 2025 report
securityaffairs.com·23h
🎯Threat Hunting
Large Language Models Achieve Gold Medal Performance at International Astronomy & Astrophysics Olympiad
arxiv.org·2h
🚀SIMD Text Processing
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·18h
🔐Cryptographic Archaeology
A Global Mining Dataset
tech.marksblogg.com·19h·
Discuss: Hacker News
📦METS Containers
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.com·16h
🕳️Information Leakage
Adversary TTP Simulation Lab
infosecwriteups.com·44m
🏠Homelab Pentesting
Satellite Warfare – An Analysis
digitalforensicsmagazine.com·2d
🎯Threat Hunting
Outsmarting Radio Jammers with AI: A Real-Time Defense Revolution
dev.to·1d·
Discuss: DEV
🌊Stream Ciphers
6th October – Threat Intelligence Report
research.checkpoint.com·20h
🛡Cybersecurity
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·2h
🕵️Vector Smuggling
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.org·1d
🔲Cellular Automata
The Making of Digital Identity – The Birth of Digital Authentication
syntheticauth.ai·1d·
🔐PKI Archaeology
Partial Information Decomposition via Normalizing Flows in Latent Gaussian Distributions
arxiv.org·2h
🧠Machine Learning
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·1d
🔐Capability Systems
Hyper-Dimensional Spectral Analysis for Plasma Process Anomaly Detection and Control
dev.to·7h·
Discuss: DEV
📄Document Digitization
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·22h
🎫Kerberos Exploitation
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·12h
🔗Constraint Handling
LLM Optimization Notes: Memory, Compute and Inference Techniques
gaurigupta19.github.io·14h·
Discuss: Hacker News
💻Local LLMs
**Hyperdimensional Semantic Graph Fusion for Enhanced Knowledge Extraction & Reasoning**
dev.to·12h·
Discuss: DEV
🧮Kolmogorov Complexity