Agenda: Future of Video
parksassociates.comยท1d
๐Ÿ”’Cyber
Flag this post
Two security issues discovered in sudo-rs, a Rust-based implemention of sudo
lists.debian.orgยท3dยท
๐Ÿ”’Cyber
Flag this post
Efficient algorithms for the surface density of states in topological photonic and acoustic systems
nature.comยท21h
๐Ÿค–AI
Flag this post
Reformed hacker who made millions stealing identities warns of 3 rising cyber threats — and how to stay safe
businessinsider.comยท17h
๐Ÿ”’Cyber
Flag this post
How Android provides the most effective protection to keep you safe from mobile scams
discuss.privacyguides.netยท1d
๐Ÿ”’Cyber
Flag this post
Use AI to Speed Up Security Hardening (and Read This First)
medium.comยท2dยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
Webinar Analytics Guide: Measure Success & Boost Performance
dev.toยท3hยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
InteractiveAdvertisingBureau/openrtb2.x
github.comยท3d
๐Ÿ”’Cyber
Flag this post
150,000 Packages Flood NPM Registry in Token Farming Campaign
darkreading.comยท11h
๐Ÿ”’Cyber
Flag this post
EU clarifies boundary between influence and manipulation under AI Act
ppc.landยท1h
๐Ÿค–AI
Flag this post
The "I'm Going to Open Port 8080" Regret: Stop Exposing Services Directly! (My Setup for Zero-Trust Home Access)
reddit.comยท17hยท
Discuss: r/homelab
๐Ÿ”’Cyber
Flag this post
ByteAether.Ulid 1.3.2: .NET 10 Support, C# 14's Field, and Engineering Zero-Overhead IDs
dev.toยท19hยท
Discuss: DEV
๐Ÿ”’Cyber
Flag this post
Private Latent Notation and AI-Human Alignment
lesswrong.comยท2h
๐Ÿค–AI
Flag this post
form11
dev.toยท1dยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
Smarter Scams, Sharper Awareness: How to Recognize and Prevent Financial Fraud in the Digital Age
blogger.comยท2d
๐Ÿ”’Cyber
Flag this post
Adaptability as the Core of Software Design
dev.toยท1dยท
Discuss: DEV
๐Ÿค–AI
Flag this post
NeuroLingua: A Language-Inspired Hierarchical Framework for Multimodal Sleep Stage Classification Using EEG and EOG
arxiv.orgยท1d
๐Ÿค–AI
Flag this post
Owlgorithm: Supporting Self-Regulated Learning in Competitive Programming through LLM-Driven Reflection
arxiv.orgยท1d
๐Ÿค–AI
Flag this post
Hornets' Kon Knueppel stars in Milwaukee homecoming, but Bucks earn overtime win
nytimes.comยท3h
๐Ÿค–AI
Flag this post
Operation Endgame 3.0 push takes down more cybercrime servers, disrupting criminal gangs
techradar.comยท20h
๐Ÿ”’Cyber
Flag this post