Shannon’s Principle in IoT: Lessons from the Field
blog.devops.devΒ·1d
πŸ€–AI
Flag this post
2025.8 release introduces Stack Overflow Internal: The next generation of enterprise knowledge intelligence
stackoverflow.blogΒ·2h
πŸ€–AI
Flag this post
The common social media security measure that creates a treasure trove for hackers
the-independent.comΒ·2h
πŸ€–AI
Flag this post
Ossa: Towards the Next Generation Web
jamesparker.meΒ·1dΒ·
Discuss: Hacker News
πŸ“˜Typescript
Flag this post
Two security issues discovered in sudo-rs, a Rust-based implemention of sudo
lists.debian.orgΒ·19hΒ·
πŸ›Politics
Flag this post
Modelling data with relations
snell-pym.org.ukΒ·19h
πŸ€–AI
Flag this post
The rise and fall of Tank the hacker who built the Zeus cybercrime empire
techspot.comΒ·31m
πŸ›Politics
Flag this post
November 2025 progress report on Microsoft’s Secure Future Initiative
microsoft.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI
Flag this post
Happy C-Day! After 5+ Years, CMMC Is Finally Here
guidepointsecurity.comΒ·2d
πŸ€–AI
Flag this post
WRITE-UP N1CTF 2025
dev.toΒ·23hΒ·
Discuss: DEV
πŸ“˜Typescript
Flag this post
Payroll Pirates: One Network, Hundreds of Targets
blog.checkpoint.comΒ·5h
πŸ€–AI
Flag this post
Patch Now: Critical Windows Vulnerability CVE-2025-24054 Actively Exploited in the Wild
thecybersecguru.comΒ·3d
πŸ“˜Typescript
Flag this post
Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity
darkreading.comΒ·1d
πŸ€–AI
Flag this post
UK Digital ID Faces Security Crisis Ahead of Mandatory Rollout
blogger.comΒ·1d
πŸ›Politics
Flag this post
Security Affairs newsletter Round 549 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·3d
πŸ›Politics
Flag this post
Commvault Transforms How Enterprises Make Clean, Complete, and Automated Cyber Recoveries
prnewswire.comΒ·2h
πŸ€–AI
Flag this post
Rewiring Human Brain Networks via Lightweight Dynamic Connectivity Framework: An EEG-Based Stress Validation
arxiv.orgΒ·1d
πŸ€–AI
Flag this post