The Canon Cat
anderegg.caยท2h
๐Ÿ–ฅ๏ธVintage Macintosh
SIEM vs SOAR: The Key Differences for Modern Security Teams
securityscorecard.comยท3d
๐ŸšจIncident Response
Find where a specific object was allocated in JavaScript with DevTools
heikkila.devยท12hยท
๐Ÿง Memory Allocators
Show HN: Universal MCP gateway for AI agents
mcp360.aiยท6hยท
Discuss: Hacker News
๐Ÿ Homelab Orchestration
Mutable atomic deletes with Parquet backed columnar tables on S3
shayon.devยท22hยท
Discuss: Hacker News
๐Ÿ—ƒ๏ธDatabase Storage
Let's Write a Macro in Rust
hackeryarn.comยท3dยท
๐Ÿฆ€Rust Macros
STPA for Software Systemsโ€“Illuminate the Unknown Unknowns
usenix.orgยท3d
๐Ÿ‘๏ธSystem Observability
Securing Kubernetes MCP Server with Pomerium and Google OAuth 2.0
reddit.comยท1dยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
A new wave of 'Shadow AI' is worrying workplaces
techradar.comยท3h
โšกProof Automation
LLP: LLM-based Product Pricing in E-commerce
arxiv.orgยท14h
๐Ÿ”BitFunnel
Unleashing Perception-Time Scaling to Multimodal Reasoning Models
arxiv.orgยท14h
๐Ÿ“ŠLearned Metrics
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท3dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Bayesian Optimization for Dynamic Sample Size Allocation in A/B Testing
dev.toยท1dยท
Discuss: DEV
๐ŸงฎKolmogorov Bounds
CVE-2025-11371: Unpatched zero-day in Gladinet CentreStack, Triofox under attack
securityaffairs.comยท1d
๐Ÿ”“Hacking
Krish Naik: Complete RAG Crash Course With Langchain In 2 Hours
dev.toยท16hยท
Discuss: DEV
๐Ÿ—ฃ๏ธDomain-Specific Languages
Show HN: I built a local AI agent desk toy
blog.simone.computerยท4dยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Build an Unbreakable EVM Read Stack in Python: Async Web3.py, ABIs, Proxies, and Decimals
dev.toยท2dยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
darkreading.comยท2d
๐Ÿ”“Hacking
Mobile App Development Trends: Insights from Leading Trusted IT Companies in the USA
dev.toยท10hยท
Discuss: DEV
๐Ÿ›ก๏ธARM TrustZone