Notes from European Progress Conference
250bpm.comยท1d
โฌœMinimalism
The Autistic Half-Century
thediff.coยท21h
๐Ÿ”BitFunnel
Red Hat Consulting breach puts over 5000 high profile enterprise customers at risk โ€” in detail
doublepulsar.comยท1d
๐ŸŽซKerberos Attacks
Seriously Testing LLMs
satisfice.comยท2d
๐Ÿ”Concolic Testing
How to Figure Out What You're Not Good At
blog.martin-haehnel.deยท6hยท
Discuss: Hacker News
๐Ÿ‘๏ธPerceptual Coding
New AWS whitepaper: Security Overview of Amazon EKS Auto Mode
aws.amazon.comยท10h
๐Ÿ“ฆContainer Security
WASM in the Kernel: Tales of Triumph and Trouble
riptides.ioยท1dยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
You might be surprised by how many fossils are from the La Brea Tar Pits
mercurynews.comยท14h
๐ŸฆดBinary Paleontology
โ€˜Itโ€™s more than a pretty backdropโ€™: crime writer Ann Cleeves on the magic of Orkney in Scotland
theguardian.comยท21h
๐ŸงŠArctic Storage
[d] AAAI 2026 Rebuttal Strategies
reddit.comยท12hยท
๐Ÿ”Information Retrieval
Bash a newline: Exploiting SSH via ProxyCommand, again (CVE-2025-61984)
dgl.cxยท1dยท
Discuss: Hacker News
โœ…Shell Verification
Donโ€™t connect your wallet: Best Wallet cryptocurrency scam is making the rounds
malwarebytes.comยท11h
๐ŸŽซKerberos Attacks
Read more: Swiss president calls for peace in Middle East
swissinfo.chยท21h
๐Ÿ”Information Retrieval
Decoding Emotion in the Deep: A Systematic Study of How LLMs Represent, Retain, and Express Emotion
arxiv.orgยท23h
๐Ÿ’ปLocal LLMs
Small Language Models for Emergency Departments Decision Support: A Benchmark Study
arxiv.orgยท23h
๐ŸŽ™๏ธWhisper
# 10 Congruent and conjugate..History and Etymology of Math Terms
pballew.blogspot.comยท21hยท
๐Ÿ”ฌLean
Understanding Retrieval Augmentation for Long-Form Question Answering
arxiv.orgยท23h
๐Ÿ”Information Retrieval
U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท20h
๐Ÿ”“Hacking