A place to meet new people and connect in Bern
connectbern.ch·2h·
Discuss: Hacker News
compliance
Flag this post
The reverse tabnabbing vulnerability in HTML
techblog.topdesk.com·13h·
Discuss: Hacker News
🛠cybersecurity
Flag this post
Skiing’s best kept secret
kill-the-newsletter.com·12h
compliance
Flag this post
Ask HN: I know how to build it, now I want to break it
news.ycombinator.com·1d·
Discuss: Hacker News
🛠cybersecurity
Flag this post
The quiet revolution: How regulation is forcing cybersecurity accountability
cyberscoop.com·2d
🛠cybersecurity
Flag this post
Privacy Protection: Cover Your Tracks
rajhackingarticles.blogspot.com·4d·
🔒MLSecOps
Flag this post
Making Hosted Control Planes possible with Talos
youtube.com·2d
🔒MLSecOps
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·2d
🛠cybersecurity
Flag this post
Lexical scope in JavaScript
dev.to·12h·
Discuss: DEV
🤖AI
Flag this post
opkssh users?
github.com·1d·
Discuss: r/selfhosted
compliance
Flag this post
I tried 4 popular free VPNs so you don’t have to—here’s the only good one
makeuseof.com·1d
🛠cybersecurity
Flag this post
How To Create A Storage For A Public Website
dev.to·1d·
Discuss: DEV
compliance
Flag this post
Choosing Between ML-KEM and ML-DSA for Your Post-Quantum Migration [Part 2]
myitbasics.com·10h·
Discuss: DEV
🔒MLSecOps
Flag this post
SemaphoreSlim in .NET, a practical guide with the rest of the toolbox
dev.to·1d·
Discuss: DEV
🔒MLSecOps
Flag this post
HYPER-ADVERTISER The Hyper Active advertiser: Marketing Hosting With Secure Cloud Integrations
hyper-advertiser.blogspot.com·1d
🛠cybersecurity
Flag this post
How to Write an Internal Policy for the Use of Artificial Intelligence
endoacustica.com·2d
⚖️AI Governance
Flag this post
GiftFlow: Self-hosted gift management with reimbursement tracking
github.com·10h·
Discuss: r/selfhosted
🛡️Privacy Engineering
Flag this post
Facade Pattern — Catalog of Enterprise Application Architecture Patterns 🏢
dev.to·2d·
Discuss: DEV
compliance
Flag this post
AIjacking Threat Exposed: How Hackers Hijacked Microsoft’s Copilot Agent Without a Single Click
blogger.com·2d
🛠cybersecurity
Flag this post
A Practical Guide to Managing Multiple Git Accounts with SSH
dev.to·2d·
Discuss: DEV
🔒MLSecOps
Flag this post