Computer vision AI VTI’s against Phishing
vmray.com·2d
👁️Perceptual Hashing
Apple Introduces $2M Bug Bounty for Spyware-Level Exploits
macrumors.com·9h
🍎Apple Archive
Roll your own bot detection: fingerprinting/JavaScript
blog.castle.io·2d·
Discuss: Hacker News
🔗Binary Similarity
DanielSant0s/AthenaEnv
github.com·5d
📺VT100 Emulation
Statistics in the Era of AI
scienceforeveryone.science·23h·
Discuss: Hacker News
🎓Academic Torrents
Protobuf: Rust Generated Code Guide
protobuf.dev·3d
🦀Rust Macros
New HuggingFace LeRobot plugin hardware drivers
huggingface.co·1d·
Discuss: Hacker News
🤖Tape Automation
Linux 6.18 Ships With A New Python App In The Source Tree
phoronix.com·1d
🔩Systems Programming
Show HN: Twoway, a Go package for HPKE encrypted request-response flows
github.com·2d·
🔑Cryptographic Protocols
How to Get Notified on SSH Logins on Linux
linuxiac.com·6d
🛡️CLI Security
Command Zero & ReversingLabs: Accelerating SOC Defense
reversinglabs.com·3d
🎯Threat Hunting
RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home device
theregister.com·23h
🎫Kerberos Attacks
Curing Miracle Steps in LLM Mathematical Reasoning with Rubric Rewards
arxiv.org·17h
🧮Theorem Proving
How to find Valkey installations on your network
runzero.com·3d
📦Container Security
From Documents to Dialogue: A step-by-step RAG Journey
dev.to·7h·
Discuss: DEV
📊Multi-vector RAG
Harness CEO Jyoti Bansal on Why AI Coding Doesn’t Help You Ship Faster
thenewstack.io·1h
🔄Language Evolution
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·17h
🔗Graph Isomorphism
Bootstrapping Python on Windows with Micromamba
dev.to·2d·
Discuss: DEV
🪟Awesome windows command-line
ARES: Multimodal Adaptive Reasoning via Difficulty-Aware Token-Level Entropy Shaping
arxiv.org·17h
🧮Kolmogorov Complexity
Data quantity doesn't matter when poisoning an LLM
theregister.com·1d·
Discuss: Hacker News
🕵️Vector Smuggling