essential spectrum
ncatlab.orgΒ·8h
πΈοΈAlgebraic Topology
Flag this post
Oui-Spy Earrings from Colonelpanic. tech
hackster.ioΒ·7h
π‘Bluetooth Archaeology
Flag this post
China Tightens Cybersecurity Rules to Curb AI and Infrastructure Threats
circleid.comΒ·2h
π¨π³Chinese Computing
Flag this post
Technology Empires and the Race to Cement Dominance
nakedcapitalism.comΒ·9h
βοΈEastern Computing
Flag this post
“Sneaky” new Android malware takes over your phone, hiding in fake news and ID apps
malwarebytes.comΒ·5h
π¦ Malware Analysis
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comΒ·4d
π΅οΈVector Smuggling
Flag this post
The Great Firewall Part 1: The Dump
π‘DNS Archaeology
Flag this post
Higher Intelligence Is Correlated with Left-Wing Beliefs and Seems to Be Genetic
π§ Personal Knowledge Base
Flag this post
Ukrainian drones reach deep inside Russia as battle for key city rages on
the-independent.comΒ·8h
π·πΊRussian Computing
Flag this post
Federated Learning for Collaborative Meteorite Data Sharing & Anomaly Detection
ποΈObservatory Systems
Flag this post
FairAIED: Navigating Fairness, Bias, and Ethics in Educational AI Applications
arxiv.orgΒ·13h
β¨Effect Handlers
Flag this post
Beyond Single-Tokenomics: How Farcaster's Pluralistic Incentives Reshape Social Networking
arxiv.orgΒ·13h
πHash Chains
Flag this post
Brussels Admits: Substantial EU Funds Have Gone to Spyware Manufacturers
heise.deΒ·21h
π³οΈInformation Leakage
Flag this post
π Automating Africaβs Energy Data Collection Using Python, Playwright, and MongoDB (2000β2024)
πData Migration
Flag this post
State of the Source at ATO 2025: AI and Data Governance
opensource.orgΒ·1h
πOpen Source Software
Flag this post
ASAN: A conceptual architecture for a self-creating, energy-efficient AI system
π€Network Automation
Flag this post
False claims and stolen bylines: The Russian propaganda strategy haunting the newsroom
euronews.comΒ·18h
π‘RSS
Flag this post
Best infosec-related long reads for the week of 10/25/25
metacurity.comΒ·3d
πHacking
Flag this post
Loading...Loading more...