Ecommerce Email & Data Specialist
freelancer.ptΒ·22h
πŸ”’Cyber
Flag this post
ELISA Project at Open Source Summit: Tokyo, Japan 2025
elisa.techΒ·9h
πŸ€–Automation
Flag this post
FreedomFest 2025 -- Naomi Brockwell, Beginner's Introduction to Privacy : CSPAN3 : November 11, 2025 3:14am-3:39am EST
archive.orgΒ·18h
πŸ”’Cyber
Flag this post
The US government is back on the offensive against DeepSeek, the Chinese AI, and espionage techniques are reve - Diario AS
news.google.comΒ·9h
πŸ”’Cyber
Flag this post
How credentials get stolen in seconds, even with a script-kiddie-level phish
malwarebytes.comΒ·13h
πŸ”’Cyber
Flag this post
Structural sign herdability of linear time-invariant systems:theory and design for arbitrary network structures
arxiv.orgΒ·21h
πŸ€–AI
Flag this post
Cybersecurity Alert as PolarEdge Botnet Hijacks 25,000 IoT Systems Globally
blogger.comΒ·2d
πŸ”’Cyber
Flag this post
ACC takes a stand, vouching for Miami over Notre Dame in CFP rankings
nytimes.comΒ·23h
πŸ€–AI
Flag this post
Detections Digest #20251110
detections-digest.rulecheck.ioΒ·1d
πŸ€–Automation
Flag this post
Don’t Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comΒ·1d
πŸ”’Cyber
Flag this post
Slow network, fast money: How Deutsche Telekom breaks the internet (denog17)
cdn.media.ccc.deΒ·13h
πŸ”’Cyber
Flag this post
NIS 2 for Non-EU Vendors: 60-Day Remediation Playbook
dev.toΒ·16hΒ·
Discuss: DEV
πŸ€–Automation
Flag this post
Top 5 network security tools to protect your business
proton.meΒ·13h
πŸ”’Cyber
Flag this post
European Governments Turn to Matrix for Secure Sovereign Messaging Amid US Big Tech Concerns
blogger.comΒ·12h
πŸ”’Cyber
Flag this post
The Law of Leaky Abstractions
joelonsoftware.comΒ·19hΒ·
Discuss: Hacker News
πŸ”’Cyber
Flag this post
Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles
arxiv.orgΒ·1d
πŸ”’Cyber
Flag this post
I Analyzed 1,000+ Business Emails and Built an AI Template That Actually Fixes Communication Chaos
dev.toΒ·11hΒ·
Discuss: DEV
πŸ€–Automation
Flag this post
Lost your iPhone? Make sure you don't make things worse by falling for this evil phishing text giving you hope
techradar.comΒ·5h
πŸ”’Cyber
Flag this post
NDC Conferences: The future & challenges of cloud - Anders Lybecker - NDC Copenhagen 2025
dev.toΒ·6hΒ·
Discuss: DEV
πŸ”’Cyber
Flag this post