University of Galway and EY collaborate on cyber education programme
siliconrepublic.comยท1d
๐Ÿ”’Cyber
Flag this post
Linux Routing Book
policyrouting.orgยท1d
๐Ÿ”’Cyber
Flag this post
Ceva Unleashes Wi-Fi 7 Pulse: Awakening Instant AI Brains in IoT and Physical Robots
semiwiki.comยท17h
๐Ÿค–AI
Flag this post
Blame as a Service
humaninvariant.comยท1dยท
Discuss: Hacker News
๐Ÿค–Automation
Flag this post
Offline Souls, Online Noise (Dead Internet) PART 2
future.forem.comยท1dยท
Discuss: DEV
๐Ÿ”’Cyber
Flag this post
When Correct Is Not Safe: Can We Trust Functionally Correct Patches Generatedby Code Agents?
paperium.netยท9hยท
Discuss: DEV
๐Ÿค–AI
Flag this post
Tiny Titans: AI-Powered Droplets Redefine Targeted Delivery
dev.toยท18hยท
Discuss: DEV
๐Ÿค–AI
Flag this post
What conspiracy theories threaten entry-level tech jobs?
dev.toยท3hยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
โ€˜High-impact sabotageโ€™: spy chief issues grave warning about espionage and sabotage threat
theconversation.comยท10h
๐Ÿ”’Cyber
Flag this post
Slow network, fast money: How Deutsche Telekom breaks the internet (denog17)
cdn.media.ccc.deยท1d
๐Ÿ”’Cyber
Flag this post
NIS 2 for Non-EU Vendors: 60-Day Remediation Playbook
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
Computability of the Optimizer for Rate Distortion Functions
arxiv.orgยท6h
๐Ÿค–AI
Flag this post
Microsoft Reveals Critical Windows Remote Desktop Flaw
techrepublic.comยท2h
๐Ÿ”’Cyber
Flag this post
Top 5 network security tools to protect your business
proton.meยท1d
๐Ÿ”’Cyber
Flag this post
Unlocking Smarter Code with AI Integration
dev.toยท5hยท
Discuss: DEV
๐Ÿค–AI
Flag this post
European Governments Turn to Matrix for Secure Sovereign Messaging Amid US Big Tech Concerns
blogger.comยท1d
๐Ÿ”’Cyber
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท1d
๐Ÿ”’Cyber
Flag this post
Classifying Histopathologic Glioblastoma Sub-regions with EfficientNet
arxiv.orgยท6h
๐Ÿค–AI
Flag this post
Exploring the World of Distributed Protocols โ€“ A Self-Taught Journey
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Cyber
Flag this post
Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security
thehackernews.comยท1d
๐Ÿ”’Cyber
Flag this post