Speedrunning an RL Environment
sidb.in·10h·
Discuss: Hacker News
🦀Rust
Flag this post
Ask HN: Do professional photographers need hardware-level image authentication?
news.ycombinator.com·9h·
Discuss: Hacker News
🔐Hardware Security
Flag this post
Breaking Monoliths Taught Me How to Fix Data
blog.matterbeam.com·1d·
Discuss: Hacker News
☁️Virtualization
Flag this post
Advancing cybersecurity a comprehensive review of AI-driven detection techniques
journalofbigdata.springeropen.com·3d·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Terminal Pacifism
serd.es·6h·
Discuss: Hacker News
💻operating systems
Flag this post
Runs-On: Mac
runs-on-mac.com·1d·
Discuss: Hacker News
☁️Virtualization
Flag this post
The cryptography behind electronic passports
blog.trailofbits.com·1d·
Discuss: Hacker News
🔐Hardware Security
Flag this post
Best Open Source Observability Solutions
clickhouse.com·1d·
Discuss: Hacker News
🐝eBPF
Flag this post
Punching Holes into Firewalls
sebsauvage.net·2d·
Discuss: Hacker News
🐝eBPF
Flag this post
Linux/WASM
joelseverin.github.io·1h·
Discuss: Hacker News
💻operating systems
Flag this post
Tricks, Treats, and Terabits
hackerfactor.com·2d·
Discuss: Hacker News
🐝eBPF
Flag this post
From Visibility to Verification: The Second Phase of AI Surface Governance
aivojournal.org·13h·
Discuss: Hacker News
🤖ai
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·3d·
🔍Ghidra
Flag this post
F5 Is Misleading the Market – The Breach Is Nowhere Near Contained
reporter.deepspecter.com·3d·
Discuss: Hacker News
🔐Hardware Security
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
therecord.media·1d·
Discuss: Hacker News
👻Rootkits
Flag this post
I Used Claude Code to Debug a Nightmare
blendingbits.io·4h·
Discuss: Hacker News
🦀Rust
Flag this post
We May Have Fixed Python's 25-Year-Old Vulnerability
iyehuda.substack.com·2d·
Discuss: Substack
📦Sandboxing
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.com·1d·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·3d·
Discuss: Hacker News
🦠Malware Analysis
Flag this post
Generative AI Security: The Shared Responsibility Framework
enkryptai.com·3d·
Discuss: Hacker News
🤖ai
Flag this post