One Year of PostgreSQL Hacking Workshops
rhaas.blogspot.com·3d·
🗄️PostgreSQL WAL
Adversary TTP Simulation Lab
infosecwriteups.com·1h
🏠Homelab Pentesting
Database Transactions: Everything That Can Go Wrong When Using Them
hackernoon.com·9h
📝Database WAL
A Global Mining Dataset
tech.marksblogg.com·20h·
Discuss: Hacker News
📦METS Containers
Measuring scaleup for Postgres 18.0 with sysbench
smalldatum.blogspot.com·1d·
📊Performance Profiling
FinReflectKG - MultiHop: Financial QA Benchmark for Reasoning with Knowledge Graph Evidence
arxiv.org·1d
🔍BitFunnel
PostgreSQL Aggregation Processing Speed
blog.kagamino.dev·14h·
Discuss: Hacker News
🗃️Database Storage
Why We Created Turso, a Rust-Based Rewrite of SQLite
thenewstack.io·15h
💾SQLite
How we trained an ML model to detect DLL hijacking
securelist.com·22h
🔗Binary Similarity
Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users
cybereason.com·2d
🗃️Database Forensics
Modular Satellite Bus Self-Diagnostics via Reinforcement Learning and Bayesian Optimization
dev.to·15h·
Discuss: DEV
🔧Hardware Verification
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·14h
🎫Kerberos Attacks
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·18h
🔐Cryptographic Archaeology
Self-Extracting F3
buttondown.com·12h·
Discuss: Hacker News
Format Verification
Show HN: TinqerJS – LINQ Inspired ORM for TypeScript Supporting Postgres, SQLite
tinqerjs.org·15h·
🧩SQLite Extensions
How To Build Effective Technical Guardrails for AI Applications
towardsdatascience.com·13h
🔗Constraint Handling
6th October – Threat Intelligence Report
research.checkpoint.com·21h
🛡Cybersecurity
Implementing a Kalman Filter in PostgreSQL to Smooth GPS Data
hackaday.com·4d
📏Range Queries
Indexing, Hashing & Query Optimization in DBMS
dev.to·1d·
Discuss: DEV
🚀Query Optimization
Toy Binary Decision Diagrams
philipzucker.com·1d
🧮Algebraic Datatypes