- 5Justice Department Announces Actions to Combat Illicit NK Revenue Generation (justice.gov)
- 2Cybercom 2.0: Pentagon Unveils Plan to Fix Cyber Talent Shortfalls (securityweek.com)
- 2Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability (securityweek.com)
- 3Multi-day storm is threatening flooding and mudslides in Southern California (cnn.com)
- 6There's No Rust on This Ironclad Kernel (hackaday.com)
- 3DNS Resolution Delay: The Silent Killer That Blocks Your Threads (howtech.substack.com)
- 3Show HN: JSON Schema → Luau type converter (Rust) (github.com)
- 155Brexit reduced UK GDP by 6-8%, investments by 12-18% [pdf] (nber.org)
- 1Firebase's new guide to securing AI endpoints (firebase.blog)
- 6Lupus may be caused by the common Epstein-Barr virus, study finds (nbcnews.com)
- 6Maintaining the Fastest CDN at Netflix on FreeBSD (freebsdfoundation.org)
- 3The short, happy reign of CD-ROM (2024) (fastcompany.com)
- 2Show HN: CodeMode – First library for tool calls via code execution (github.com)
- 3Why isn't everyone using Cerebras? ()
- 3Hacker Stations (hackerstations.com)
- 5I got scammed for $157 000 for trying to revive my favorite videogame (phack-the-publisher.com)
- 4Hackers and crime rings are teaming up to steal cargo, cyber firm says (japantimes.co.jp)
- 16His Legal Name Is One Letter–Airline Rejects It and Says 'Just Call Yourself AA' (viewfromthewing.com)
- 2Washington Court: Data Captured on Flock Safety Cameras Are Public Records (eff.org)
- 7Jimmy Wales, Co-Founder of Wikipedia, quits interview angrily after one question (old.reddit.com)
- 9Facts that might mess with your sense of time (datawrapper.de)
- 52USDA head says 'everyone' on SNAP will now have to reapply (thehill.com)
- 1Developers Can Choose the Right AI Coding Tool Without Feeling Overwhelmed (practicalsecurity.substack.com)
- 3Show HN: OpEx, an agentic LLM toolkit for Elixir (github.com)
- 1Fumadocs – open-source React.js docs framework (github.com)
- 1Google DeepMind is using Gemini to train agents inside Goat Simulator 3 (technologyreview.com)
- 4CAIDA Spoofer - minimize the Internet's susceptibility to spoofed DDoS attacks (caida.org)
- 2Networks vulnerable to IP spoofing for the last year (spoofer.caida.org)
- 1From ETL to AI(e)tl: Rethinking Data Pipelines for the AI Era (evanvolgas.substack.com)
- 164Go's Sweet 16 (go.dev)