NPM supply chain attacks with Charlie Erickson
opensourcesecurity.ioยท1d
๐Hacking
Flag this post
Google Issues Critical New VPN Threat Warning For Billions Of Users
forbes.comยท1d
๐Hacking
Flag this post
Show HN: Pingu Unchained an Unrestricted LLM for High-Risk AI Security Research
๐ Homelab Pentesting
Flag this post
Show HN: Smart File Organizer, a free app to automatically sort your folders
๐คArchive Automation
Flag this post
Unclonable Cryptography in Linear Quantum Memory
arxiv.orgยท4d
๐ฒLattice Cryptography
Flag this post
My T430 setup
๐ฅHome Lab Setup
Flag this post
What if 100 agents could optimize your code simultaneously in isolated production environments without copying data?
๐ฏPerformance Proofs
Flag this post
Learn Kubernetes
๐ฆContainer Security
Flag this post
Go Concurrent Maps: From Bottlenecks to High-Performance Sharded Solutions That Scale
๐๏ธDatabase Sharding
Flag this post
TYrPPG: Uncomplicated and Enhanced Learning Capability rPPG for Remote Heart Rate Estimation
arxiv.orgยท1h
๐Riemannian Computing
Flag this post
A Pentium In Your Hand
hackaday.comยท5d
๐น๏ธRetro Gaming
Flag this post
Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity
๐ Homelab Pentesting
Flag this post
The Ultimate Guide to Continuous Threat Exposure Management (CTEM)
vmray.comยท9h
๐ฏThreat Hunting
Flag this post
Understanding Cross Task Generalization in Handwriting-Based Alzheimer's Screening via Vision Language Adaptation
arxiv.orgยท1h
๐คAdvanced OCR
Flag this post
Dutch Metaphor Extraction from Cancer Patients' Interviews and Forum Data using LLMs and Human in the Loop
arxiv.orgยท1h
๐Digital humanities
Flag this post
Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems
securityaffairs.comยท3d
๐ซKerberos Exploitation
Flag this post
Loading...Loading more...