Verizon to slash 15,000 jobs in its biggest shake-up ever
techspot.comยท12h
๐Ÿค–Automation
Flag this post
What are your thoughts on sewer surveillance?
pubmed.ncbi.nlm.nih.govยท12hยท
Discuss: r/privacy
๐Ÿค–Automation
Flag this post
Delhi blast: Crime branch registers 2 FIRs against Al-Falah University for cheating and forgery
nordot.appยท14h
๐Ÿค–AI
Flag this post
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
blog.nviso.euยท2d
๐Ÿ”’Cyber
Flag this post
Live from the Press Box
nordot.appยท8h
๐Ÿค–AI
Flag this post
Update your old Asus DSL router for a critical security flaw
nordot.appยท1d
๐Ÿ”’Cyber
Flag this post
My own GPT - you can bake your own too
reddit.comยท20hยท
Discuss: r/ChatGPT
๐Ÿค–Automation
Flag this post
A Dual-Stream Spatio-Temporal Graph Neural Network for Dust Storm Forecasting and Attribution in the Sistan Basin
sciencedirect.comยท12h
๐Ÿค–AI
Flag this post
Tech With Tim: 7 Python Anti Patterns to Avoid
dev.toยท6hยท
Discuss: DEV
๐Ÿค–AI
Flag this post
Ask HN: Architecting audit-grade ESG platforms โ€“ AI assistants vs. human CTOs
news.ycombinator.comยท14hยท
Discuss: Hacker News
๐Ÿค–Automation
Flag this post
BSI on Cybersecurity: Stably Insecure
heise.deยท4d
๐Ÿ”’Cyber
Flag this post
PostgreSQL: The Powerhouse Database
dev.toยท56mยท
Discuss: DEV
๐Ÿค–Automation
Flag this post
Australiaโ€™s spy chief warns of China-linked threats to critical infrastructure
securityaffairs.comยท3d
๐Ÿ”’Cyber
Flag this post
Harnessing the power of generative AI: Druvaโ€™s multi-agent copilot for streamlined data protection
aws.amazon.comยท1d
๐Ÿค–Automation
Flag this post
Chrome extension โ€œSaferyโ€ steals Ethereum wallet seed phrases
securityaffairs.comยท2d
๐Ÿ”’Cyber
Flag this post
I replaced my ISP's router with a cheap mini PC โ€” and you can too
xda-developers.comยท14h
๐Ÿ”’Cyber
Flag this post
James Franklin, Virginia Tech talks coming to a head, resolution expected by Monday: Sources
nytimes.comยท11h
๐Ÿค–AI
Flag this post
Availability - Heartbeats (2)
dev.toยท6hยท
Discuss: DEV
๐Ÿ”’Cyber
Flag this post
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses
dev.toยท3dยท
Discuss: DEV
๐Ÿค–AI
Flag this post