Two men charged in Detroit-area terrorism plot after Halloween arrests
the-independent.comยท1d
๐Ÿ‘๏ธSurveillance Detection
Flag this post
Making Audible Sense Of A Radiation Hunt
hackaday.comยท8h
๐Ÿ‘๏ธSurveillance Detection
Flag this post
Ukrainian drones reach deep inside Russia as battle for key city rages on
the-independent.comยท10h
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
Augsburg: Polizei entdeckt illegales Waffenlager bei verstorbenem Rentner
spiegel.deยท34m
๐Ÿ•ตOSINT
Flag this post
General Atomics launches Gambit 6 drone wingman for air-to-ground operations
breakingdefense.comยท6h
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
Cold War arms-control pioneers perhaps werenโ€™t peacemakers we thought they were
news.harvard.eduยท2h
๐ŸŒGeopolitics
Flag this post
Think for Yourself
kevlinhenney.medium.comยท35mยท
Discuss: Hacker News
๐ŸŠDonald Trump
Flag this post
Open Source Context-Aware PII Classifier
corp.roblox.comยท41mยท
Discuss: Hacker News
๐ŸƒCamouflage
Flag this post
Europe's secret weapon against Russian 'disposable agents'
euronews.comยท4d
โš”๏ธGray Zone Warfare
Flag this post
New comment by kanwisher in "Ask HN: Who is hiring? (November 2025)"
tensorfleet.netยท11hยท
Discuss: Hacker News
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
AI-Driven Spectrum Allocation Optimization via Bayesian Federated Learning on Edge SDR Platforms
dev.toยท3dยท
Discuss: DEV
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
AI Decoded : BBCNEWS : November 2, 2025 10:30pm-11:00pm GMT
archive.orgยท1d
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
I Use AI
ben.stolovitz.comยท5hยท
Discuss: Hacker News
๐Ÿ’ปCLI Tools
Flag this post
IoMT Vulnerabilities Putting Patient Health Data at Risk
hackernoon.comยท1d
๐Ÿ‘๏ธSurveillance Detection
Flag this post
Information Gain-based Policy Optimization: A Simple and Effective Approach forMulti-Turn LLM Agents
paperium.netยท18hยท
Discuss: DEV
๐Ÿ›ฉ๏ธDrone Warfare
Flag this post
Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector
arxiv.orgยท15h
๐Ÿ”Intelligence Analysis
Flag this post
Shadow AI: The hidden agents beyond traditional governance
nordot.appยท8h
๐Ÿ‘๏ธSurveillance Detection
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
simonw.substack.comยท1dยท
Discuss: Substack
๐Ÿ—๏ธLock Picking
Flag this post