Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.comยท2d
๐Ÿ›กCybersecurity
Windows/WSL hardware ssh & gpg keys
blog.dan.drown.orgยท4h
๐Ÿ”’Hardware Attestation
Open ASR Leaderboard tests more than 60 speech recognition models for accuracy and speed
the-decoder.comยท1d
๐ŸŽ™๏ธWhisper
DFIR Next Steps: Suspicious Pulseway Use
cybertriage.comยท4d
๐Ÿ›ก๏ธeBPF Security
ExecPlans โ€“ How to get your coding agent to run for hours
kau.shยท9h
โšกProof Automation
Real-Time AI-Powered DDoS Detection
timeplus.comยท5dยท
Discuss: Hacker News
๐Ÿ•ต๏ธNetwork Forensics
Organize automated tests without getting eaten by your devs
octomind.devยท3dยท
Discuss: Hacker News
๐Ÿ”Concolic Testing
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
krebsonsecurity.comยท2dยท
Discuss: Hacker News
๐ŸŒDNS Security
ksmbd - Exploiting CVE-2025-37947 (3/3)
blog.doyensec.comยท5dยท
๐Ÿ“ฆContainer Security
UFS 5.0: New flash memory to be almost twice as fast as UFS 4.0
heise.deยท4d
๐Ÿ’ฟZFS Internals
Qantas customer data surfaces online after cyberattack
heise.deยท15h
๐Ÿ”“Hacking
Show HN: Aidlab โ€“ Health Data for Devs
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
HIRE META TECH RECOVERY PRO TO RECOVER YOUR LOST OR STOLEN BITCOIN/ETH/USDT/NFT AND CRYPTOCURRENCY
dev.toยท3dยท
Discuss: DEV
๐ŸŽซKerberos Attacks
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท2d
๐ŸŒDNS Security
00. AI in Bioinformatics
dev.toยท9hยท
Discuss: DEV
๐ŸฆดDatabase Paleontology
Kurzgesagt - In a Nutshell: AI Slop Is Destroying The Internet
dev.toยท14hยท
Discuss: DEV
๐Ÿ“ฐContent Curation
CrisiText: A dataset of warning messages for LLM training in emergency communication
arxiv.orgยท6h
๐ŸงฎProlog Parsing
Alif: Advancing Urdu Large Language Models via Multilingual Synthetic Data Distillation
arxiv.orgยท6h
๐ŸŽ™๏ธWhisper