Mitre ATT&CK v18 released
medium.com·6h·
Discuss: Hacker News
📊Threat Intelligence
Flag this post
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails
dev.to·6h·
Discuss: DEV
🛡️AI Security
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.io·3d·
Discuss: Hacker News
☁️Cloud Security
Flag this post
DDD and the Simplicity Gospel
oluatte.com·11h·
🏛️Technical Architecture
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·1d·
Discuss: Hacker News
📊Threat Intelligence
Flag this post
The Attacker Moves Second: Stronger Adaptive Attacks Bypass Defenses Against LlmJailbreaks and Prompt Injections
dev.to·4h·
Discuss: DEV
🛡️AI Security
Flag this post
From Friction to Function: fixing the prod/eng relationship
leaddev.com·11h·
Discuss: Hacker News
👥Engineering Management
Flag this post
Cloud CISO Perspectives: AI as a strategic imperative to manage risk
cloud.google.com·1d
🛡️AI Security
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
aivojournal.org·1d·
Discuss: Hacker News
🛡️AI Security
Flag this post
OpenAI Launches Aardvark To Detect and Patch Hidden Bugs In Code
it.slashdot.org·1d
🔄DevSecOps
Flag this post
Show HN: KeyLeak Detector – Scan websites for exposed API keys and secrets
github.com·11h·
Discuss: Hacker News
🕵️OSINT
Flag this post
Attacking macOS XPC Helpers: Protocol Reverse Engineering and Interface Analysis
tonygo.tech·10h·
🍎Apple
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·1d·
Discuss: Hacker News
🛡️AI Security
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.com·1d·
Discuss: Hacker News
🛡️AI Security
Flag this post
Security Doesn’t Have to Hurt
docker.com·1d
☁️Cloud Security
Flag this post
Smaller Surfaces
nrempel.com·12h·
Discuss: Hacker News
🔧MLOps
Flag this post
Best Digital Marketing Institute in Allahabad – Ndmit Prayagraj
ndmit.com·3h·
Discuss: Hacker News
🧠LLM Engineering
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.com·21h·
Discuss: Hacker News
🏛️Technical Architecture
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·3d·
Discuss: Hacker News
🕵️OSINT
Flag this post
Securing the AI Era: How Development, Security, and Compliance Must Evolve
devops.com·4d
🛡️AI Security
Flag this post