Alleged Russia-linked Curly COMrades exploit Windows Hyper-V to evade EDRs
securityaffairs.com·20h
🔓Hacking
Flag this post
InfoSec News Nuggets 11/06/2025
aboutdfir.com·20h
🔓Hacking
Flag this post
What are computers for, anyway?
forum.merveilles.town·1d
⚡Homebrew CPUs
Flag this post
Lightstep is shutting down March 1, 2026
🏠Home Automation
Flag this post
Fixing the ReactOS Test Suite
❄️Nix Flakes
Flag this post
What Apple’s UK Strategic Market Status Designation means for Browsers and Web Apps
🎬WebCodecs
Flag this post
Optimizing filtered vector queries from tens of seconds to single-digit milliseconds in PostgreSQL
🧠Query Planners
Flag this post
Louvre heist reveals museum used ‘LOUVRE’ as password for its video surveillance, still has workstations with Windows 2000 - glaring security weaknesses reveale...
tomshardware.com·18h
🏺Kerberos Archaeology
Flag this post
Ask HN: My family business runs on a 1993-era text-based-UI (TUI). Anybody else?
💾vintage computing
Flag this post
Assessing Climate Vulnerability Risk for Substations in Massachusetts Via Sensitivity Analysis
arxiv.org·49m
🦀Embedded Rust
Flag this post
LibreELEC 12.2.1 Media Center Arrives with Kodi 21.3 Omega
linuxiac.com·3d
🔓Open Source Software
Flag this post
TypeScript Rewrote Itself in Go?! What That “10x Faster” Hype Really Means
🎯Gradual Typing
Flag this post
Preserving the Past with Purpose
dpconline.org·9h
⚖️Archive Ethics
Flag this post
Prompt Injection as an Emerging Threat: Evaluating the Resilience of Large Language Models
arxiv.org·3d
🧪Binary Fuzzing
Flag this post
Twirlator: A Pipeline for Analyzing Subgroup Symmetry Effects in Quantum Machine Learning Ansatzes
arxiv.org·49m
🕸️Tensor Networks
Flag this post
The OSI Model Explained: How Data Really Flows Through the Internet
🔌Interface Evolution
Flag this post
Loading...Loading more...