Enea AB (publ) (ENEKF) Discusses Strategic Update and Positioning Amid Geopolitical and Security Trends Transcript
seekingalpha.comยท7h
๐Ÿ’ŽEthereum
Flag this post
SampCert: Verified Foundations for Differential Privacy (PLDI 2025)
dl.acm.orgยท18hยท
Discuss: Hacker News
๐Ÿ”Cryptography
Flag this post
Credentials and Misconfigurations Behind Most Cloud Breaches, Says AWS
hackread.comยท1d
๐Ÿ”Cryptography
Flag this post
How the F5 breach, CISA job cuts, and a government shutdown are eroding U.S. cyber readiness
cyberscoop.comยท1d
โ›“๏ธBlockchain
Flag this post
๐Ÿ›ก๏ธ The Silent Defender: How Device Binding Became the Backbone of Payment Security
medium.comยท23hยท
Discuss: DEV
๐Ÿ’ŽEthereum
Flag this post
What data do coding agents send, and where to?
chasersystems.comยท2dยท
Discuss: Hacker News
๐Ÿ’ปCLI Tools
Flag this post
A review of MSUM's AI Innovation Summit: Day Two
lesswrong.comยท10h
๐Ÿ—ƒ๏ธZettelkasten
Flag this post
Q&A: Sean Zadig of Yahoo on Employing AI in Security
decipher.scยท17h
๐ŸŒณGit
Flag this post
Former cybersecurity employees attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.comยท2d
๐Ÿ”Cryptography
Flag this post
It is our responsibility to develop a healthy relationship with our technology
lesswrong.comยท17h
โ™Ÿ๏ธGame Theory
Flag this post
Why Every Online Business Needs DDoS Protection in 2025
dev.toยท2hยท
Discuss: DEV
๐Ÿ”Cryptography
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
datatracker.ietf.orgยท1dยท
Discuss: Hacker News
โ™Ÿ๏ธGame Theory
Flag this post
The kgateway vulnerabilities explained (and why I disagree on its score!)
dev.toยท17hยท
Discuss: DEV
๐ŸงLinux
Flag this post
Enhanced Intrusion Detection via Adaptive Ensemble of Federated Generative Adversarial Networks
dev.toยท1dยท
Discuss: DEV
โ™Ÿ๏ธGame Theory
Flag this post
Hackers commit highway robbery, stealing cargo and goods
malwarebytes.comยท15h
๐Ÿ”Cryptography
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptographic Threats
dev.toยท1hยท
Discuss: DEV
๐Ÿ”Cryptography
Flag this post
Building an OAuth2 Protected API with C#, IdentityServer, and ASP.NET Core
dev.toยท16hยท
Discuss: DEV
๐Ÿ’ŽEthereum
Flag this post
Enterprise Design Patterns: The Repository Pattern (Catalog of Patterns of EAA) โ€” A Practical Guide with Python
dev.toยท9hยท
Discuss: DEV
๐ŸŒณGit
Flag this post