Which tech company launched the world's first bug bounty program?
techspot.com·1d
🚀Indie Hacking
Flag this post
The API vulnerabilities nobody talks about: excessive data exposure
blog.detectify.com·17h
🛡️CBOR Security
Flag this post
Return to Silicon Valley
substrate.com·5h·
Discuss: Hacker News
🖥️Modern Terminals
Flag this post
Introducing gpt-oss-safeguard
openai.com·6h·
Discuss: Hacker News
🧠Program Logic
Flag this post
Moderation Sabotage: How Trump's Team Is Crashing the Guardrails of the Internet
weaponizedspaces.substack.com·18h·
Discuss: Substack
📡Feed Security
Flag this post
Making the Internet observable: the evolution of Cloudflare Radar
blog.cloudflare.com·1d·
Discuss: Hacker News
🕸️Mesh Networking
Flag this post
Dual-Mind World Models: A General Framework for Learning in Dynamic Wireless Networks
arxiv.org·2h
🧠Machine Learning
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·2d
🧮Algebraic Datatypes
Flag this post
The New Calculus of AI-Based Coding
blog.joemag.dev·1d·
Discuss: Hacker News
🔄Reproducible Builds
Flag this post
The staying power of tape storage in the AI era
techradar.com·15h
🤖Tape Automation
Flag this post
A Control-Theoretic Perspective on BBR/CUBIC Congestion-Control Competition
arxiv.org·1d
📡Network Calculus
Flag this post
Your AI Agent Is Now a Target for Email Phishing
spectrum.ieee.org·1d·
Proof Automation
Flag this post
Memento Labs, the ghost of Hacking Team, has returned — or maybe it was never gone at all.
securityaffairs.com·1d
🔓Hacking
Flag this post
Scratching the Itch, Paying the Debt: How Community Keeps Legacy Open Source Projects Alive
dev.to·13h·
Discuss: DEV
🔓Open Source Software
Flag this post
Yet another way to use Tornado Cash in 2025, a tool implemented in Python&C++
news.ycombinator.com·1d·
Discuss: Hacker News
🌊Apache Kafka
Flag this post
Open Korean Historical Corpus: A Millennia-Scale Diachronic Collection of Public Domain Texts
arxiv.org·2h
🔤Character Classification
Flag this post
The Evolving Battlefield: AI vs. AI in Network Security by Arvind Sundararajan
dev.to·2d·
Discuss: DEV
🎯Threat Hunting
Flag this post
Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study
arxiv.org·1d
🌊Stream Ciphers
Flag this post
Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa
darkreading.com·42m
🛡Cybersecurity
Flag this post