Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.comยท3dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท1dยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท12hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.techยท3dยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
AI scrapers request commented scripts
cryptography.dogยท1dยท
๐Ÿ›Fuzzing
Flag this post
I Used Claude Code to Debug a Nightmare
blendingbits.ioยท2hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
Speedrunning an RL Environment
sidb.inยท8hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท23hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
bleepingcomputer.comยท3hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
BYOD security solutions explained
proton.meยท1dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
EY 4TB Data Leak
neosecurity.nlยท2dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
A Formulation of Slop: How Optimization Pressure Destroys Meaning
intuitmachine.medium.comยท8hยท
Discuss: Hacker News
๐Ÿค–ai
Flag this post
Linux Kernel Ported to WebAssembly
lore.kernel.orgยท4hยท
Discuss: Hacker News
๐Ÿ”งKernel Development
Flag this post
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
socket.devยท2dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Hardware to Prove Humanity
juliver.bearblog.devยท2dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Show HN: AlomWare Toolbox โ€“ A cool Windows productivity tool
alomware.comยท8hยท
Discuss: Hacker News
๐Ÿ’ปoperating systems
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
aivojournal.orgยท11hยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1dยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.mediaยท1dยท
Discuss: Hacker News
๐Ÿ”’security
Flag this post