Russian spies pack custom malware into hidden VMs on Windows machines
theregister.com·4h
🔓Hacking
Flag this post
Quoting Steve Francia
simonwillison.net·20h
🧮Theoretical Computer Science
Flag this post
Entropy in algorithm analysis
11011110.github.io·3d
🧮Kolmogorov Complexity
Flag this post
Show HN: I was tired of wasting engineer time on screening calls so I built Niju
🌊Stream Processing
Flag this post
Cybercriminals break into logistics companies and steal cargo
heise.de·7h
🕵️Vector Smuggling
Flag this post
CHERIoT 1.0 Released
🧲RISC-V Preservation
Flag this post
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
youtube.com·15h
🔓Hacking
Flag this post
A Hacker’s Journey to NASA’s Hall of Fame
infosecwriteups.com·1d
🔓Hacking
Flag this post
Automated Anomaly Detection and Predictive Maintenance in Self-Propelled Brush Rollers Using Bayesian Network Fusion
🌊Stream Processing
Flag this post
Accelerated Dielectric Barrier Coating Optimization via Multi-Modal Data Fusion & Bayesian Hyperparameter Tuning
🧠Machine Learning
Flag this post
Hacking the Color BASIC PRINT command – part 7
subethasoftware.com·4h
📺VT100
Flag this post
Uncrossed Multiflows and Applications to Disjoint Paths
arxiv.org·18h
🕸️Network Topology
Flag this post
Is This The Last PCB You’ll Ever Buy?
hackaday.com·1d
⚙️DIY Electronics
Flag this post
I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed
🚀Indie Hacking
Flag this post
AI Agents in Go: Exploring Agent-to-Agent (A2A) Protocols in AI Ecosystems
🔌Interface Evolution
Flag this post
Inferring multiple helper Dafny assertions with LLMs
arxiv.org·18h
🦀Rust Verification
Flag this post
Loading...Loading more...