Delaware top lawyer warns of legal action if OpenAI fails to act in public interest
ft.com·10h
⚖️Archive Ethics
Flag this post
Unmasking risks that haunt your supply chain
redcanary.com·12h
🔗Supply Chain
Flag this post
Ex-Mossad chief brags Israel has installed a global sabotage network
middleeastmonitor.com·10h·
Discuss: Hacker News
🧅Tor Networks
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.net·3d
💾vintage computing
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.org·5h
🛡Cybersecurity
Flag this post
We Let Our AI Deploy Itself to Production
teammates.work·2d·
Discuss: Hacker News
📏Code Metrics
Flag this post
See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.me·14h
🔓Hacking
Flag this post
Guiding AI Agents Through Error Messages
maybedont.ai·2d·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
How AI Phishing Is Putting School Districts at Risk
hackernoon.com·22h
🛡Cybersecurity
Flag this post
Wanting to start homelab, trying something new.
reddit.com·1d·
Discuss: r/homelab
🏠Homelab
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.org·2d
🔍Vector Forensics
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·14h
🔐Quantum Security
Flag this post
Three More X.Org Server & XWayland Security Vulnerabilities Made Public
phoronix.com·2d
❄️Nix Adoption
Flag this post
Show HN: TinyBoards – Self-Hosted FOSS Social Platform (Rust and GraphQL API)
github.com·2d·
Discuss: Hacker News
🔄Sync Engine
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.com·7h
🔓Hacking
Flag this post
Google probes exploitation of critical Windows service CVE
cybersecuritydive.com·2d
🔓Hacking
Flag this post
Talk about geriatric - This devious Android malware escapes detection by typing like an old person
techradar.com·1d
🦠Malware Analysis
Flag this post
Covert Surveillance in Smart Devices: A SCOUR Framework Analysis of Youth Privacy Implications
arxiv.org·1d
🕳️Information Leakage
Flag this post
Debugging AI in Production: Root Cause Analysis with Observability
dev.to·1d·
Discuss: DEV
👁️System Observability
Flag this post