Delaware top lawyer warns of legal action if OpenAI fails to act in public interest
ft.com·10h
⚖️Archive Ethics
Flag this post
Unmasking risks that haunt your supply chain
redcanary.com·12h
🔗Supply Chain
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.net·3d
💾vintage computing
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.org·5h
🛡Cybersecurity
Flag this post
We Let Our AI Deploy Itself to Production
📏Code Metrics
Flag this post
See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.me·14h
🔓Hacking
Flag this post
Guiding AI Agents Through Error Messages
🎯Threat Hunting
Flag this post
How AI Phishing Is Putting School Districts at Risk
hackernoon.com·22h
🛡Cybersecurity
Flag this post
Even the most complex and advanced business VPN tools could still leave you at risk of attack - here's how to stay safe
techradar.com·8h
🌐BGP Security
Flag this post
SecureLearn - An Attack-agnostic Defense for Multiclass Machine Learning Against Data Poisoning Attacks
arxiv.org·2d
🔍Vector Forensics
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·14h
🔐Quantum Security
Flag this post
Three More X.Org Server & XWayland Security Vulnerabilities Made Public
phoronix.com·2d
❄️Nix Adoption
Flag this post
Show HN: TinyBoards – Self-Hosted FOSS Social Platform (Rust and GraphQL API)
🔄Sync Engine
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.com·7h
🔓Hacking
Flag this post
Google probes exploitation of critical Windows service CVE
cybersecuritydive.com·2d
🔓Hacking
Flag this post
Talk about geriatric - This devious Android malware escapes detection by typing like an old person
techradar.com·1d
🦠Malware Analysis
Flag this post
Covert Surveillance in Smart Devices: A SCOUR Framework Analysis of Youth Privacy Implications
arxiv.org·1d
🕳️Information Leakage
Flag this post
Loading...Loading more...