Krish Naik: What Is LLM Poisoning? Interesting Break Through
dev.to·4h·
Discuss: DEV
💻Local LLMs
Flag this post
Artificial Influencers and the Dead Internet Theory
link.springer.com·47m·
Discuss: Hacker News
🌍Cultural Algorithms
Flag this post
Kazhdan Seminar fall 2025 – Starting Today Oct. 19, 2026.
gilkalai.wordpress.com·6h
🧮Theoretical Computer Science
Flag this post
Informatics Researchers Develop Hybrid Quantum-Secure Communication Protocol
informatics.ed.ac.uk·1d
🔐Quantum Security
Flag this post
First Kubernetes project
reddit.com·19h·
Discuss: r/kubernetes
📦Container Security
Flag this post
Generating Fair Consensus Statements with Social Choice on Token-Level MDPs
arxiv.org·2d
🤝Consensus Networks
Flag this post
AI, Quantum Computing and Other Emerging Risks
paloaltonetworks.com·2d
🔐Quantum Security
Flag this post
Kubernetes and Etcd Are Not Secure, Until Now
personal-website-3bm.pages.dev·3d·
Discuss: Hacker News
🔐Homomorphic Encryption
Flag this post
Hackers Dox ICE, DHS, DOJ, and FBI Officials
wired.com·1d
🔓Hacking
Flag this post
‘Nightmare’ calculation may be too tricky for even quantum computers
newscientist.com·1d
⚛️Quantum Algorithms
Flag this post
Beyond Human Bias: Designing AI with Broader Ethics by Arvind Sundararajan
future.forem.com·42m·
Discuss: DEV
⚖️Emulation Ethics
Flag this post
Hacking Workshop for November 2025
rhaas.blogspot.com·2d·
🔐Homomorphic Encryption
Flag this post
Extortion and Ransomware Drive Over Half of Cyberattacks — Sometimes Using AI, Microsoft Finds
it.slashdot.org·1h
🔓Hacking
Flag this post
apis.google.com - Insecure redirect via __lu parameter (exploited in the wild)
seclists.org·9h
🎫Kerberos Exploitation
Flag this post
Google says hackers are turning public blockchains into unkillable malware safehouses
techspot.com·1d·
Discuss: r/technews
🕵️Vector Smuggling
Flag this post
What is PL research and how is it useful?
pl-enthusiast.net·19h·
Discuss: Hacker News
💻Programming languages
Flag this post
AI SOC will outpace MDR even at its core of detection engineering
intezer.com·2h
🎯Threat Hunting
Flag this post
AI Chat Data Is History’s Most Thorough Record of Enterprise Secrets, Secure it Wisely
darkreading.com·1d
🎯Threat Hunting
Flag this post
Swarm Intelligence: Unlocking AI Understanding Through Mimicry
dev.to·1d·
Discuss: DEV
🔲Cellular Automata
Flag this post
Introducing GenosDB: a P2P Graph Database with Built-In Zero-Trust Security
hackernoon.com·4d
🌳Archive Merkle Trees
Flag this post