- Kyo: Toolkit for Scala Development
by based2 on 5/3/25, 7:18 PM, with comments
- Scalar Conference 2025 – Summary and Highlights
by based2 on 5/3/25, 7:11 PM, with comments
- RFK Jr. & HHS: Last Week Tonight with John Oliver (HBO) [video]
by based2 on 5/3/25, 5:40 PM, with comments
- Apache Airflow 3 is Generally Available
by based2 on 5/3/25, 3:55 PM, with comments
- OpenDesk Architecture
by based2 on 5/3/25, 3:52 PM, with comments
- Changes to Microsoft Authenticator Autofill
by based2 on 5/3/25, 3:02 PM, with comments
- Cybersecurity (Anti)Patterns: Busywork Generators
by based2 on 5/3/25, 2:56 PM, with comments
- OpenStack at the April 2025 PTG: All Things 'Epoxy' & 'Flamingo'
by based2 on 4/25/25, 8:42 PM, with comments
- What is encrypted SNI? – How ESNI works
by based2 on 4/21/25, 2:09 PM, with comments
- Can You Run the Llama 2 LLM on DOS?
by based2 on 4/21/25, 1:41 PM, with comments
- Wazuh: Open-Source Security Platform. Unified XDR and SIEM Protection for Endpoi
by based2 on 4/21/25, 1:25 PM, with comments
- ReVision Party 2ø25
by based2 on 4/21/25, 12:13 PM, with comments
- Snappy: Fast Compressor/Decompressor
by based2 on 4/21/25, 12:06 PM, with comments
- Enlightenment desktop: Terminology 1.14.0 Release
by based2 on 4/21/25, 11:29 AM, with comments
- Finance worker pays out $25M after video call with deepfake 'chief financ (2024)
by based2 on 3/16/25, 10:01 PM, with comments
- Get Answers from EU Institutions
by based2 on 12/29/24, 9:23 PM, with comments
- 38c3: Automated Malfare – discriminatory effects of welfare automation
by based2 on 12/29/24, 8:45 PM, with comments
- 38c3: Self Models of Loving Grace by Joshua Bach
by based2 on 12/29/24, 11:02 AM, with comments
- Researchers crack Microsoft Azure MFA
by based2 on 12/13/24, 9:20 PM, with comments
- Exploring the Potential of Stonebraker's New DBOS
by based2 on 11/24/24, 3:25 PM, with comments
- Perfecting Ransomware on AWS – Using keys to the kingdom to change the locks
by based2 on 10/12/24, 3:20 PM, with comments
- Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Snipe
by based2 on 10/12/24, 3:17 PM, with comments
- Securing our future: September 2024 progress update on Microsoft's Secure Future
by based2 on 10/12/24, 2:55 PM, with comments
- Critical flaw in Nvidia Container Toolkit allows full host takeover
by based2 on 9/29/24, 9:38 PM, with comments
- The Treasures of Crash Reports
by based2 on 9/29/24, 1:44 PM, with comments
- Enisa Threat Landscape 2024
by based2 on 9/28/24, 11:45 AM, with comments
- CVE-2024-6104 go-retryablehttp
by based2 on 9/28/24, 11:02 AM, with comments
- Forward Secrecy
by based2 on 9/28/24, 10:58 AM, with comments
- CosmicBeetle joins the ranks of RansomHub affiliates
by based2 on 9/28/24, 10:47 AM, with comments
- Disgomoji Malware Used to Target Indian Government
by based2 on 9/28/24, 10:33 AM, with comments
- Hyundai Faces New Theft Threat from "Game Boy" Hack
by based2 on 9/28/24, 9:56 AM, with comments
- Insecurity Through Censorship: Vulnerabilities Caused by the Great Firewall
by based2 on 9/28/24, 9:36 AM, with comments