Caddy snippets for static sites
willnorris.comยท1d
๐Interface Evolution
Flag this post
Owning our own data is the only way to stop enshittifcation
newscientist.comยท1d
๐ Personal Archives
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.comยท1d
๐ฆ Malware Analysis
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท1d
๐ซKerberos Attacks
Flag this post
The art and science of effective security storytelling
redcanary.comยท4d
๐Data Provenance
Flag this post
Building AI Agents on the Frontend with Sam Bhagwat and Abhi Aiyer
softwareengineeringdaily.comยท1d
โกProof Automation
Flag this post
Show HN: Bypassing face recognition using Fawkes โ Now with web interface
๐Password Cracking
Flag this post
Pentagon Proudly Announces Its New Stable Of Propagandists
techdirt.comยท16h
๐กRSS
Flag this post
Pulsar Detection with Deep Learning
arxiv.orgยท9h
๐Spectrograms
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.orgยท9h
๐Log Parsing
Flag this post
Statistically Adaptive Differential Protection for AC Microgrids Based on Kullback-Leibler Divergence
arxiv.orgยท9h
๐Digital Signal Processing
Flag this post
maxVSTAR: Maximally Adaptive Vision-Guided CSI Sensing with Closed-Loop Edge Model Adaptation for Robust Human Activity Recognition
arxiv.orgยท9h
๐๏ธPerceptual Hashing
Flag this post
Dentsuโs US subsidiary Merkle hit by cyberattack, staff and client data exposed
securityaffairs.comยท1d
๐กCybersecurity
Flag this post
Central Submonads and Notions of Computation: Soundness, Completeness and Internal Languages
arxiv.orgยท9h
๐งฎAlgebraic Archives
Flag this post
Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
arxiv.orgยท9h
๐ต๏ธVector Smuggling
Flag this post
Adaptive Fault Diagnostic System for BACnet HVAC Networks via Hyperdimensional Vector Analysis
๐๏ธObservatory Systems
Flag this post
An 18-Year-Old Codebase Left Smart Buildings Wide Open
darkreading.comยท16h
๐Hacking
Flag this post
Linear Causal Discovery with Interventional Constraints
arxiv.orgยท9h
โจEffect Handlers
Flag this post
Loading...Loading more...