Designing future possibilities together
channelnewsasia.comยท1d
๐Typescript
Flag this post
How to Crack Machine Learning System-Design Interviews
towardsdatascience.comยท17h
๐คAI
Flag this post
Abusing Delegation with Impacket (Part 2): Constrained Delegation
blackhillsinfosec.comยท2d
๐คAI
Flag this post
Ubuntu Server Security Suggestions
๐Politics
Flag this post
The Trustless Manifesto
๐Typescript
Flag this post
Air Force veteran says cybersecurity is a natural career transition for civilian lifeโand itโs a field with more than 500,000 open jobs
fortune.comยท3d
๐Politics
Flag this post
Separating QMA from QCMA with a classical oracle
arxiv.orgยท2d
๐คAI
Flag this post
AI Agents Design Patterns: Complete Guide to Agentic AI Models in 2025
pub.towardsai.netยท9h
๐คAI
Flag this post
Disrupting the first reported AI-orchestrated cyber espionage campaign - Anthropic
news.google.comยท1d
๐คAI
Flag this post
Introducing the 2025 State of Threat Intelligence Report: Threat Intelligence Shifts from Defense to Strategy
recordedfuture.comยท3d
๐คAI
Flag this post
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
thehackernews.comยท14h
๐Politics
Flag this post
Worm flooding npm registry with token stealers still isnโt under control
infoworld.comยท7h
๐Typescript
Flag this post
Simulator and Experience Enhanced Diffusion Model for Comprehensive ECG Generation
arxiv.orgยท1d
๐คAI
Flag this post
Protect yourself from data breaches with this Black Friday VPN Deal
techradar.comยท1d
๐Politics
Flag this post
Questioning Computationalism
lesswrong.comยท1d
๐คAI
Flag this post
[Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR
thehackernews.comยท2d
๐คAI
Flag this post
Loading...Loading more...