Offline Souls, Online Noise (Dead Internet) PART 2
future.forem.com·21h·
Discuss: DEV
🔒Cyber
Flag this post
Linux Routing Book
policyrouting.org·22h
🔒Cyber
Flag this post
Blame as a Service
humaninvariant.com·10h·
Discuss: Hacker News
🤖Automation
Flag this post
Happy C-Day! After 5+ Years, CMMC Is Finally Here
guidepointsecurity.com·2d
🔒Cyber
Flag this post
Coherence Mechanisms for Provable Self-Improvement
arxiv.org·12h
🤖AI
Flag this post
University of Galway and EY collaborate on cyber education programme
siliconrepublic.com·1d
🔒Cyber
Flag this post
Intrusion (INTZ) Q3 2025 Earnings Call Transcript
fool.com·18h
🔒Cyber
Flag this post
Educational Byte: How to Find and Install a Fully Decentralized Node on Obyte
hackernoon.com·1d
🔒Cyber
Flag this post
Are You GDPR Ready? Essential Cybersecurity Steps to Protect Your Data
dev.to·2d·
Discuss: DEV
🔒Cyber
Flag this post
8 Recommended Account Takeover Security Providers
hackread.com·17h
🤖Automation
Flag this post
MITRE ATT&CK v18: What’s in it — and why it matters
reversinglabs.com·1d
🔒Cyber
Flag this post
Building a Social Network Analyzer with CXXGraph: From Friend Recommendations to Influence Detection
dev.to·6h·
Discuss: DEV
🔒Cyber
Flag this post
Genetec highlights the essential role of physical security in IT infrastructure protection
zawya.com·4h
🔒Cyber
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.com·21h
🔒Cyber
Flag this post
Scaling HNSWs
antirez.com·1d·
🔒Cyber
Flag this post
💥 Tech Talks Weekly #82
techtalksweekly.io·25m
🤖AI
Flag this post
10th November – Threat Intelligence Report
research.checkpoint.com·2d
🔒Cyber
Flag this post
The Art of Deception: How AI is Redefining Strategic Warfare by Arvind Sundararajan
dev.to·1d·
Discuss: DEV
🤖AI
Flag this post