Checklist: Securely Using a Python Program
nocomplexity.com·1d
🛡️CLI Security
Flag this post
Deep dive into the Elixir Logger module
honeybadger.io·6h
📝Log Parsing
Flag this post
SnakeStealer Infostealer Tops Detection Charts with Major Data-Harvesting Capabilities
zimperium.com·17h
🎯Threat Hunting
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.com·14h
🚀Indie Hacking
Flag this post
qntm/fastjson: Single-tweet, standards-compliant, high-performance JSON stack
github.com·3d
📝ABNF Parsing
Flag this post
Render’s MCP Server Bridges the Gap Between LLMs and Cloud Infrastructure
hackernoon.com·15h
👁️Observatory Systems
Flag this post
Show HN: TinyBoards – Self-Hosted FOSS Social Platform (Rust and GraphQL API)
🔄Sync Engine
Flag this post
Leverage Unlearning to Sanitize LLMs
arxiv.org·2d
💻Local LLMs
Flag this post
Building a WebGPU shader editor for designers
🎬WebCodecs
Flag this post
Reverse engineering Kilter board app
🔓Reverse engineering
Flag this post
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models
arxiv.org·2h
🎙️Whisper
Flag this post
ReForm: Reflective Autoformalization with Prospective Bounded Sequence Optimization
arxiv.org·2h
💻Programming languages
Flag this post
Scratching the Itch, Paying the Debt: How Community Keeps Legacy Open Source Projects Alive
🔓Open Source Software
Flag this post
Yensid: A proxy for better Nix remote builds
❄️Nixpkgs
Flag this post
Securing the AI Era: How Development, Security, and Compliance Must Evolve
devops.com·12h
🎯Threat Hunting
Flag this post
Loading...Loading more...