Recon2012: Reverse engineering of binary programs for custom virtual machines
recon.cx·9h·
Discuss: Hacker News
SIMD Optimization
AI-Enhanced Malware Sports Super-Stealthy Tactics
darkreading.com·22h
🔍AI Detection
A Small Tool to Understand How Spam Filtering Works
dev.to·17h·
Discuss: DEV
🧮Apache Calcite
China-related threat actors deployed a new fileless malware against the Philippines military
techradar.com·20h
🕵️Memory Forensics
Mosyle uncovers new cross-platform malware undetected by antivirus tools
9to5mac.com·23h·
Discuss: Hacker News
🧊Iceberg Tables
Launch HN: Ghostship (YC S25) – AI agents that find bugs in your web app
news.ycombinator.com·21h·
Discuss: Hacker News
🔍AI Detection
The Invisible Character That Cost Me Too Much Debugging Time
blog.dochia.dev·5h·
Discuss: r/programming
🏗data engineering
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.com·2h
🛡️Memory Safety
Team Atlanta
team-atlanta.github.io·2h·
Discuss: Lobsters
🔍AI Detection
Huntress's 'hilarious' attacker surveillance splits infosec community
theregister.com·9h·
Discuss: Hacker News
📋Tokei
The Silent Thief in Your Code: When AI Assistants Get Hacked
dev.to·18h·
Discuss: DEV
🔍AI Detection
Setting up rooted Android emulator with Frida and mitmproxy
trickster.dev·16h·
Discuss: Hacker News
📋Tokei
Docling: The Document Alchemist
towardsdatascience.com·27m
📓Jupyter
Show HN: ScamBare Text Checker
scambare.com·22h·
Discuss: Hacker News
🕵️Memory Forensics
The reference genome of the human diploid cell line RPE-1
nature.com·7h
🧬Bioinformatics
Enhance video understanding with Amazon Bedrock Data Automation and open-set object detection
aws.amazon.com·21h
🏗data engineering
LLM-Generated Rules Engines for LLM Explainability
brain.co·4h·
Discuss: Hacker News
🔄Feed Aggregation
Shielding High-Demand Systems from Fraud
ipsator.com·8h·
Discuss: r/programming
📊Data Lineage