Properly framing the AI SOC conversation
intezer.comยท1d
๐Ÿ”Capability Systems
Flag this post
jlesage/docker-jdownloader-2
github.comยท39m
๐Ÿ“ฆContainer Security
Flag this post
Is RSS Still Relevant?
idiallo.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฐRSS Reading Practices
Flag this post
Norway Leads Global EV Adoption
oilprice.comยท6hยท
Discuss: Hacker News
โš™๏ธSwedish Assembly
Flag this post
From Signals to Reliability: SLOs, Runbooks and Post-Mortems
fatihkoc.netยท20hยท
๐Ÿ‘๏ธObservatory Systems
Flag this post
Masked Softmax Layers in PyTorch
mcognetta.github.ioยท10hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท4dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
How I Automated My Most Tedious Task and Unlocked Our Growth Strategy
devops.comยท6h
๐Ÿค–Archive Automation
Flag this post
The ZeroAccess Developer and His Windows Kernel-Mode Debugger
r136a1.devยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Flag this post
AI Summarization Optimization
schneier.comยท14hยท
Discuss: Hacker News
๐Ÿ“ŠFeed Optimization
Flag this post
Writing an LLM from scratch, part 27 โ€“ what's left, and what's next?
gilesthomas.comยท1hยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
Flag this post
Functional embeddings enable Aggregation of multi-area SEEG recordings over subjects and sessions
arxiv.orgยท21h
๐Ÿ“ŠLearned Metrics
Flag this post
Deep Neural Watermarking for Robust Copyright Protection in 3D Point Clouds
arxiv.orgยท21h
๐Ÿ“Geometric Hashing
Flag this post
China-linked UNC6384 exploits Windows zero-day to spy on European diplomats
securityaffairs.comยท2d
๐ŸŽซKerberos Exploitation
Flag this post
Geonum โ€“ geometric number library for unlimited dimensions with O(1) complexity
github.comยท12hยท
Discuss: Hacker News
๐Ÿ’ŽInformation Crystallography
Flag this post
Carlos Alcaraz and Jannik Sinner to play exhibition eight days before Australian Open
the-independent.comยท16h
๐Ÿ‘‘Isabelle
Flag this post
Human rights breaches precede mass atrocities
phys.orgยท48m
โš–๏ธArchive Ethics
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comยท1d
๐Ÿ”—Hash Chains
Flag this post
Beware - ransomware gang is tricking victims with fake Microsoft Teams ads
techradar.comยท9h
๐ŸŽซKerberos Attacks
Flag this post
Contrastive Knowledge Transfer and Robust Optimization for Secure Alignment of Large Language Models
arxiv.orgยท21h
๐Ÿ’ปLocal LLMs
Flag this post