Osint Intelligence Analysis
📊Threat Intelligence
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·2d
⚛️Quantum Security
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
🔐Privacy Tech
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
🛡️AI Security
Flag this post
HydraPWK2 Is a Linux Distribution That Simplifies Pentesting
thenewstack.io·7h
🔄DevSecOps
Flag this post
Unhinged Uncensored Model Evolution: Feedback on Satyr V0.1 to Shape Future Releases!
🛡️AI Security
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·1d
🛡️AI Security
Flag this post
Rewilding the Internet
🏗information architecture
Flag this post
Mitre ATT&CK v18 released
📊Threat Intelligence
Flag this post
The Great Firewall Part 1: The Dump
📊Threat Intelligence
Flag this post
After the Last Git Commit
🖥️Self-hosted apps
Flag this post
Rhysida OysterLoader campaign leverages 40 code-signing certificates
🛠️Product Security
Flag this post
Federated Anomaly Detection for Robot Surveillance Data with Differential Privacy
🛡️AI Security
Flag this post
Reflections on Trusting Trust (1984)
⚛️Quantum Security
Flag this post
Is RSS Still Relevant?
👁️Observability
Flag this post
Loading...Loading more...