PHONIX VIPER NOVA CTF#2
ctftime.org·4d
🧪Binary Fuzzing
Flag this post
Inside Europe’s AI-Fuelled GLP-1 Scam Epidemic: How Criminal Networks Are Hijacking the Identities of the NHS, AEMPS, ANSM, BfArM and AIFA to Sell Fake Weight-L...
blog.checkpoint.com·2d
🕵️Vector Smuggling
Flag this post
Securing Global Communications: An Examination of Foreign Adversary Threats to Subsea Cable Infrastructure
blog.telegeography.com·2d
🕵️Network Forensics
Flag this post
Charter of Democratic Pansystemism:Replacing the Constitution with Cybernetics [pdf]
📖Nordic Typography
Flag this post
Where Is This Place
🏺Computational Archaeology
Flag this post
Russian 'terrorism' in Poland spurs calls for further EU sanctions
euobserver.com·3d
🇵🇱Polish Assembly
Flag this post
A Comprehensive Study on Cyber Attack Vectors in EV Traction Power Electronics
arxiv.org·2d
🔬Hardware Forensics
Flag this post
2 robbers overpower a guard and steal dozens of ancient gold coins from a Swiss museum
the-independent.com·2d
🏺Kerberos Archaeology
Flag this post
It's Not the AI - It's Each of Us! Ten Commandments for the Wise & Responsible Use of AI
arxiv.org·2d
🔲Cellular Automata
Flag this post
Tell HN: How to Think about AI
🔐Systems Hardening
Flag this post
The world is experiencing a new era of impunity 80 years after the Nuremberg trials
english.elpais.com·14h
🇵🇱Polish Assembly
Flag this post
Portfolio Project: Python Terminal Game
🎯Proof Tactics
Flag this post
Angular Graph Fractional Fourier Transform: Theory and Application
arxiv.org·2d
📈Spectral Graph Theory
Flag this post
A Senior Developer’s Guide to Python’s High-Performance Data Structures
📝Concrete Syntax
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
LLMs Are Getting Jailbroken by… Poetry. Yes, The rest is silence.
arxiv.org·2d
📝ABNF Extensions
Flag this post
Loading...Loading more...