PostgreSQL: MD5 password support is deprecated โ€“ updating the user passwords
dan.langille.orgยท7h
๐Ÿ”’Cyber
Flag this post
How I Reverse Engineered a High-Volume Solana Arbitrage Bot
clumsy-geranium-e59.notion.siteยท3hยท
Discuss: r/programming
๐Ÿค–Automation
Flag this post
Learning Topology-Driven Multi-Subspace Fusion for Grassmannian Deep Network
arxiv.orgยท18h
๐Ÿค–AI
Flag this post
Rust in Android: move fast and fix things (Google Security Blog)
lwn.netยท2h
๐Ÿ”’Cyber
Flag this post
Police take down three cybercrime operations in latest round of โ€˜whack-a-moleโ€™
techcrunch.comยท5h
๐Ÿ”’Cyber
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.comยท4d
๐Ÿ”’Cyber
Flag this post
Diffusion Policies with Value-Conditional Optimization for Offline Reinforcement Learning
arxiv.orgยท18h
๐Ÿค–AI
Flag this post
UK Cyber Defense Laws Aim to Bolster NHS and Energy Infrastructure
techrepublic.comยท10h
๐Ÿ”’Cyber
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท2d
๐Ÿ”’Cyber
Flag this post
What conspiracy theories threaten entry-level tech jobs?
dev.toยท15hยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
โ€˜High-impact sabotageโ€™: spy chief issues grave warning about espionage and sabotage threat
theconversation.comยท22h
๐Ÿ”’Cyber
Flag this post
Slow network, fast money: How Deutsche Telekom breaks the internet (denog17)
cdn.media.ccc.deยท2d
๐Ÿ”’Cyber
Flag this post
NIS 2 for Non-EU Vendors: 60-Day Remediation Playbook
dev.toยท2dยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
Computability of the Optimizer for Rate Distortion Functions
arxiv.orgยท18h
๐Ÿค–AI
Flag this post
Top 5 network security tools to protect your business
proton.meยท2d
๐Ÿ”’Cyber
Flag this post
Unlocking Smarter Code with AI Integration
dev.toยท17hยท
Discuss: DEV
๐Ÿค–AI
Flag this post
Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security
thehackernews.comยท1d
๐Ÿ”’Cyber
Flag this post
Privacy fears drive VPN boom as Italy enforces mandatory age verification
techradar.comยท1d
๐Ÿ”’Cyber
Flag this post
Classifying Histopathologic Glioblastoma Sub-regions with EfficientNet
arxiv.orgยท18h
๐Ÿค–AI
Flag this post
Multi-modal Deepfake Detection and Localization with FPN-Transformer
arxiv.orgยท1d
๐Ÿค–AI
Flag this post