youbecks's Top FindsLoading...
Speechcrime
city-journal.org·17h
🦹cybercrime
Flag this post
A Judge’s Decision Just Made Cities Panic Over What Their Cameras Recorded
carscoops.com·6h
Flag this post
Researchers Hack ChatGPT Memories and Web Search Features
securityweek.com·10h·
Discuss: Hacker News
Flag this post
NPM supply chain attacks with Charlie Erickson
opensourcesecurity.io·6h
Flag this post
Google Security Researchers ID AI-Powered Malware Used in Real World Cyberattack
axios.com·4d
💥Cyberattack
Flag this post
Meta’s ‘Rule of Two’ Is Dangerous: The AI Security Crisis No One’s Admitting
pub.towardsai.net·3d
💥Cyberattack
Flag this post
I Taught Postgres to Fight Hackers - And It Worked (Agent Auth)
dev.to·2h·
Discuss: DEV
💥Cyberattack
Flag this post
Stop hard expiration of passwords, secrets and certificates
reddit.com·10h·
Flag this post
High-Severity Vulnerability CVE-2024-0670 Puts Checkmk Windows Agents at Risk
thecybersecguru.com·16h
💥Cyberattack
Flag this post
Critical AI Infrastructure Security Threat: Reproducing and Detecting the NVIDIA Triton Critical Vulnerability(CVE-2025-23316)
dev.to·3h·
Discuss: DEV
Flag this post
This is how I went completely incognito on Windows 11
makeuseof.com·13h
Flag this post
Sign up or login to customize your feed and get personalized topic recommendations
Ernst & Young Exposes 4TB Database Backup Online, Leaking Company Secrets
blogger.com·19h
💥Cyberattack
Flag this post
US Congressional Budget Office hit by suspected cyberattack - here's what we know
techradar.com·2d
🦹cybercrime
Flag this post
The Security Logic Behind LLM Jailbreaking
dev.to·38m·
Discuss: DEV
🔍Cyber threat intelligence
Flag this post
r/SillyTavernAI
reddit.com·20h·
💥Cyberattack
Flag this post
Understanding prompt injections: a frontier security challenge
openai.com·2d
💥Cyberattack
Flag this post
Exploratory Analysis of Cyberattack Patterns on E-Commerce Platforms Using Statistical Methods
arxiv.org·4d
💥Cyberattack
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
dev.to·21h·
Discuss: DEV
Flag this post
University of Pennsylvania confirms recent cyberattack led to major data theft
techradar.com·3d
🦹cybercrime
Flag this post