Why Threat Actors Succeed
paloaltonetworks.comΒ·3d
🎯Threat Hunting
Flag this post
Pepsi, when they don't have coke
bitecode.devΒ·1d
πŸŒ€Brotli Internals
Flag this post
How I Chose The Tech Stack For Job Helper
playfulprogramming.comΒ·18h
πŸ“‘RSS Automation
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.eduΒ·8h
🌐DNS Security
Flag this post
But What Is the Internet Layer?
lakshyamittal.substack.comΒ·2dΒ·
Discuss: Substack
πŸ“‘Network Protocol Design
Flag this post
Accessibility APIs for AI Agents
colton.placeΒ·21hΒ·
Discuss: Hacker News
πŸ“ŸCLI Design
Flag this post
Reagami: a Reagent-like library in less than 100 lines of Squint CLJS
blog.michielborkent.nlΒ·2dΒ·
Discuss: Hacker News
🎯Gradual Typing
Flag this post
What does computer literacy mean for 2026?
sjg.ioΒ·4hΒ·
Discuss: Hacker News
🧠Personal Knowledge Base
Flag this post
Visibility at scale: How Figma detects sensitive data exposure
figma.comΒ·4dΒ·
Discuss: Hacker News
🌊Stream Processing
Flag this post
The Chinese Box and Turing Test: Is AI really intelligent?
theregister.comΒ·9hΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
Flag this post
From β€œI want automation” to β€œIt runs”: 15 decisions for lead enrichment that actually execute
dev.toΒ·9hΒ·
Discuss: DEV
πŸ”„Reproducible Builds
Flag this post
The Limits of LLM-Generated Unit Tests
hackernoon.comΒ·3d
πŸ§ͺProperty-Based Testing
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
dev.toΒ·2dΒ·
Discuss: DEV
🎯Threat Hunting
Flag this post
VOA : mini secrets manager
reddit.comΒ·17hΒ·
Discuss: r/kubernetes
πŸš€Indie Hacking
Flag this post
Coding by Vibe, by Tests, or by Spec Which Hat Are You Wearing?
dev.toΒ·21hΒ·
Discuss: DEV
πŸ“Code Metrics
Flag this post
AI agents require to-do lists to stay on track
blog.justcopy.aiΒ·1dΒ·
Discuss: Hacker News
βš™οΈTLA+
Flag this post
Rationalizable Screening and Disclosure under Unawareness
arxiv.orgΒ·14h
πŸ•³οΈInformation Leakage
Flag this post
When the VIBEs Start to Fade
mindruptive.comΒ·3dΒ·
Discuss: Hacker News
πŸ—οΈCompiler Archaeology
Flag this post
The security paradox of local LLMs
quesma.comΒ·5dΒ·
πŸ”“Hacking
Flag this post