threat intelligence, malware analysis, national security, nation state actors, apt, ttps 

Ex-Mossad chief brags Israel has installed a global sabotage network
middleeastmonitor.com·3d·
Discuss: Hacker News
📻meshtastic lora radio
Flag this post
Logistic Growth of Chess
lichess.org·14h·
Discuss: Hacker News
🗄️SQLite
Flag this post
Going a Step Beyond Ultrasonic Sensors
aptiv.com·14h·
Discuss: Hacker News
📻meshtastic lora radio
Flag this post
A/B Testing Could Lead LLMs to Retain Users Instead of Helping Them
newsletter.danielpaleka.com·17h·
Discuss: Hacker News
🗄️SQLite
Flag this post
When fintech startups outgrow their own controls, Linqto's collapse as a warning
capitalfolly.com·8h·
Discuss: Hacker News
🗄️SQLite
Flag this post
Oops, My UUIDs Collided
alexsci.com·2d·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Improving Emacs' iCalendar Support
recursewithless.net·15h·
Discuss: Hacker News
🗄️SQLite
Flag this post
EY 4TB Data Leak
neosecurity.nl·4d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
You’ll never see attrition referenced in an RCA
surfingcomplexity.blog·11h·
Discuss: Hacker News
🖥homelab
Flag this post
Ransomware gang runs ads for Microsoft Teams to pwn victims
theregister.com·2d·
Discuss: Hacker News
🔍reverse engineering
Flag this post
From Signals to Reliability: SLOs, Runbooks and Post-Mortems
fatihkoc.net·6h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Octocode MCP – AI Researcher for Smart, Deep Multi-Repo Code Context
github.com·4h·
Discuss: Hacker News
🔍reverse engineering
Flag this post
My First Multi-GPU Kernel: Writing All-to-All for AMD MI300X
gau-nernst.github.io·11h·
Discuss: Hacker News
🖥homelab
Flag this post
AI scrapers request commented scripts
cryptography.dog·2d·
🔍reverse engineering
Flag this post
Oxy is Cloudflare's Rust-based next generation proxy framework
blog.cloudflare.com·9h·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Show HN: Farseer, rust rewrite of prophet with some extra goodies
ryanbieber.github.io·2d·
Discuss: Hacker News
🔧IDA Pro
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·2d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.io·4d·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Context-Bench: Benchmarking LLMs on Agentic Context Engineering
letta.com·2d·
Discuss: Hacker News
🧰WebAssembly Systems
Flag this post
Why a Volatile World Demands a Smarter (Re)Insurance Market
insurtechamsterdam.com·2d·
Discuss: Hacker News
📡Network Protocol Analysis
Flag this post