Show HN: Computational Metaphysics: Zeroth Implementation of Grover's and Shor's
🔤typography
Flag this post
Atroposia Malware Offers Attackers Built-In Tools to Spy, Steal, and Scan Systems
blogger.com·1d
🔤typography
Flag this post
🆓 Will Glow the Wisp is free to keep on Steam https://store.steampowered.com/app/640890/?curator_clanid=4777282&utm_source=SteamDB
🔤typography
Flag this post
Thoughts on bug bounty programs
blog.birbpara.de·8h
🌐Open Source
Flag this post
Working on a digital vault, looking for advice or examples (zero-knowledge, cryptography, encryption)
🌐Open Source
Flag this post
Foreign hackers breach U.S. Congressional Budget Office - WaPo
nordot.app·1d
📊Data Visualization
Flag this post
Have I Been Pwned: Billions of New Passwords in Collection
heise.de·2d
📊Data Visualization
Flag this post
APPLE-SA-11-03-2025-9 Xcode 26.1
seclists.org·1d
🌐Open Source
Flag this post
Tracking Down Progressively-Enhanceable APIs
willhbr.net·1d
🔤typography
Flag this post
Vibing Negative
theblackwall.uk·2d
🔤typography
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·1d
⚖law
Flag this post
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
thehackernews.com·1d
🌐Open Source
Flag this post
Kawaiicon 3 - Day 2
rodger.donaldson.gen.nz·11h
🔤typography
Flag this post
Ethics: I Sent a Harsh Email to a Failing Employee. They’re in Tears. How Do I Fix This?
inc.com·8h
🔤typography
Flag this post
“I Paid Twice” Scam Infects Booking.com Users with PureRAT via ClickFix
hackread.com·1d
🔤typography
Flag this post
Loading...Loading more...