The Autistic Half-Century
thediff.coยท12h
๐Ÿ”BitFunnel
Working for a Vendor with David Gee
blog.ipspace.netยท11h
๐ŸงฒRISC-V Archaeology
New AWS whitepaper: Security Overview of Amazon EKS Auto Mode
aws.amazon.comยท1h
๐Ÿ“ฆContainer Security
Briefly Noted: Summer Reading
thepsmiths.comยท21hยท
Discuss: Hacker News
๐Ÿ”ฌLean
Dotenvx โ€“ A Secure Dotenv
dotenvx.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Exterro Launches FTK Imager Pro, Unlocking Faster Access To Encrypted Evidence For Investigators Worldwide
forensicfocus.comยท1d
๐Ÿ’ฟDAT Forensics
You might be surprised by how many fossils are from the La Brea Tar Pits
mercurynews.comยท5h
๐ŸฆดBinary Paleontology
โ€˜Itโ€™s more than a pretty backdropโ€™: crime writer Ann Cleeves on the magic of Orkney in Scotland
theguardian.comยท12h
๐ŸงŠArctic Storage
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984)
dgl.cxยท15hยท
Discuss: Hacker News
โœ…Shell Verification
Donโ€™t connect your wallet: Best Wallet cryptocurrency scam is making the rounds
malwarebytes.comยท2h
๐ŸŽซKerberos Attacks
Misunderstood and Misaligned
bozhao.substack.comยท1dยท
Discuss: Substack
๐Ÿ”—Constraint Handling
Phishers target 1Password users with convincing fake breach alert
malwarebytes.comยท1d
๐ŸŽฏNTLM Attacks
A First Look at the Lifecycle of DL-Specific Self-Admitted Technical Debt
arxiv.orgยท14h
๐Ÿ“Code Metrics
Read more: Swiss president calls for peace in Middle East
swissinfo.chยท11h
๐Ÿ”Information Retrieval
Decoding Emotion in the Deep: A Systematic Study of How LLMs Represent, Retain, and Express Emotion
arxiv.orgยท14h
๐Ÿ’ปLocal LLMs
Small Language Models for Emergency Departments Decision Support: A Benchmark Study
arxiv.orgยท14h
๐ŸŽ™๏ธWhisper
# 10 Congruent and conjugate..History and Etymology of Math Terms
pballew.blogspot.comยท12hยท
๐Ÿ”ฌLean
Understanding Retrieval Augmentation for Long-Form Question Answering
arxiv.orgยท14h
๐Ÿ”Information Retrieval