wastrel, a profligate implementation of webassembly
🌐WASI
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Turning 500 Lines of If-Else Into a Config Switch: Strategy Pattern in Go
⚔️Lean Tactics
Flag this post
ESTIMED_hackathon1_SSSUP
hackster.io·1d
🧩WASM Components
Flag this post
Vibe coding needs a spec, too
stackoverflow.blog·12h
🔌Interface Evolution
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.io·2d
🔗Supply Chain
Flag this post
Building Up And Sanding Down
endler.dev·20h
🔩Systems Programming
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
Introducing SWE-1.5: Our Fast Agent Model
simonwillison.net·1d
🔲Cellular Automata
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.io·1d
🔐CBOR
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
BYOD security solutions explained
proton.me·7h
🔐Capability Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
An introduction to OCI Containers on FreeBSD
freebsdfoundation.org·2h
📦METS Containers
Flag this post
U.S. CISA adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔓Hacking
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.org·1d
🗺️Competency Maps
Flag this post
Loading...Loading more...