Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.com¡3d
đHacking
Flag this post
Properly framing the AI SOC conversation
intezer.com¡9h
đCapability Systems
Flag this post
New RBI rule: Banks move to secure '.bank.in' domains to curb online fraud
đ¤EBCDIC Privacy
Flag this post
Linkdump No 79
82mhz.net¡3d
đšī¸Retro Gaming
Flag this post
The Smallest PNG
đ¸PNG Optimization
Flag this post
The Treachery of Image Files
beyondloom.com¡1h
đ Terminal Fonts
Flag this post
Show HN: I built a lightweight AI tool to analyze visitor behavior
đFeed Optimization
Flag this post
Top 6 API Architecture Styles
blog.algomaster.io¡4d
âĄgRPC
Flag this post
A Quantitative Framework to Predict Wait-Time Impacts Due to AI-Triage Devices in a Multi-AI, Multi-Disease Workflow
arxiv.org¡51m
đStream Processing
Flag this post
Scans for Port 8530/8531 (TCP). Likely related to WSUS Vulnerability CVE-2025-59287, (Sun, Nov 2nd)
isc.sans.edu¡12h
đĄNetwork Monitoring
Flag this post
Building Resilient Go Services: Context, Graceful Shutdown, and Retry/Timeout Patterns
đStreaming Systems
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com¡4d
đĢKerberos Attacks
Flag this post
Do AI Browsers Exist For You - or To Give AI Companies Data?
tech.slashdot.org¡14h
đ¤AI Curation
Flag this post
Linux/WASM
đ¸ī¸WASM Archives
Flag this post
NetBSD developer shares GSoC 2025 Mentor Summit experience in Munich
discoverbsd.com¡1d
đĄOpenBSD
Flag this post
Simple Additions, Substantial Gains: Expanding Scripts, Languages, and Lineage Coverage in URIEL+
arxiv.org¡51m
đConcatenative Languages
Flag this post
Loading...Loading more...