γγ‘γγγγγ³γγε₯εΊ·ζθγε€γγγγΆγ€γ³γθ©δΎ‘ ACC TOKYO CREATIVITY AWARDSγγγ³γΊεθ³
news.jpΒ·4h
π¦Rust
Flag this post
Mullvad VPN rolls out LWO for desktop and Android to bypass firewalls and censorship
alternativeto.netΒ·13h
π§Linux
Flag this post
Author Correction: Learning the natural history of human disease with generative transformers
nature.comΒ·17h
π¦Rust
Flag this post
Chatkontrolle 2.0
renecoignard.comΒ·13h
π¦Rust
Flag this post
I didn't reverse-engineer the protocol for my blood pressure monitor in 24 hours
π§Linux
Flag this post
Tangled Mess
π¦Rust
Flag this post
Microsoft Earnings, CoreAI/MantleAI, Additional Notes
stratechery.comΒ·1d
π§Linux
Flag this post
Govini Issues Statement on Eric Gillespie
prnewswire.comΒ·46m
π¦Rust
Flag this post
Daily - 2025-11-12
blog.ctms.meΒ·1d
π¦Rust
Flag this post
Join the The Newest Social Network and Party Like its 1987
hackaday.comΒ·18h
π§Linux
Flag this post
NSS Labs Selects ectacom GmbH to Expand Cybersecurity Representation in Central Europe
prnewswire.comΒ·18h
π¦Rust
Flag this post
Prompt Injection in AI Browsers
schneier.comΒ·1d
π¦Rust
Flag this post
FreedomFest 2025 -- Naomi Brockwell, Beginner's Introduction to Privacy : CSPAN3 : November 10, 2025 8:59pm-9:24pm EST
archive.orgΒ·2d
π¦Rust
Flag this post
Operation Protect Veterans aims to help vulnerable veterans avoid scammers
ketv.comΒ·1d
π¦Rust
Flag this post
North Korea-linked Konni APT used Google Find Hub to erase data and spy on defectors
securityaffairs.comΒ·1d
π§Linux
Flag this post
Keynote: There's Nothing to Fear About the EU's New Cybersecurity Law - Greg Kroah-Hartman
youtube.comΒ·4h
π§Linux
Flag this post
ID verification laws are fueling the next wave of breaches
bleepingcomputer.comΒ·4d
π¦Rust
Flag this post
Synology patches critical BeeStation RCE flaw shown at Pwn2Own Ireland 2025
securityaffairs.comΒ·17h
π¦Rust
Flag this post
Loading...Loading more...