Similar Articles

Articles similar to the selected content.

Domain: www.msuiche.com Added: 2025-08-30 Status: βœ“ Success
www.msuiche.com
The Genesis: When Signatures Aren’t Enough πŸ”— In the world of mobile security research, there’s a recurring frustration that keeps many of us up at night: the most sophisticated exploits - the ones tha...
Similar Articles (10 found)
πŸ” 61.3% similar
An Attacker’s Blunder Gave Us a Look Into Their Operations | Huntress
https://www.huntress.com/blog/rare-look-inside-attacker-operation
Here at Huntress, we love exposing adversary tradecraft, and we also love when threat actors make blunders. So imagine our delight when a threat actor...
πŸ” View Similar Articles 🟠 HN
πŸ” 56.7% similar
Process Behaviour Anomaly Detection Using eBPF and Unsupervised-Learning Autoencoders
https://www.evilsocket.net/2022/08/15/Process-behaviour-anomaly-detection-using-eBPF-and-unsupervised-learning-Autoencoders/
Process Behaviour Anomaly Detection Using eBPF and Unsupervised-Learning Autoencoders Hello everybody, I hope you’ve been enjoying this summer after t...
πŸ” View Similar Articles 🟠 HN
πŸ” 56.4% similar
We all dodged a bullet
https://xeiaso.net/notes/2025/we-dodged-a-bullet/
We all dodged a bullet Published on , 971 words, 4 minutes to read That NPM attack could have been so much worse. Yesterday one of the biggest package...
πŸ” View Similar Articles 🟠 HN
πŸ” 54.3% similar
https://bobdahacker.com/blog/rbi-hacked-drive-thrus/
https://bobdahacker.com/blog/rbi-hacked-drive-thrus/
The Setup Picture this: Restaurant Brands International (RBI) – the corporate overlords behind Burger King, Tim Hortons, and Popeyes – control over 30...
πŸ” View Similar Articles 🟠 HN
πŸ” 52.2% similar
There is no longer any such thing as Computer Security
https://blog.codinghorror.com/there-is-no-longer-any-such-thing-as-computer-security/
There is no longer any such thing as Computer Security Remember β€œcybersecurity”? Mysterious hooded computer guys doing mysterious hooded computer guy....
πŸ” View Similar Articles 🟠 HN
πŸ” 51.7% similar
Stretch iPhone to its Limit, a 2GiB Model that can Draw Everything in Your Pocket
https://liuliu.me/eyes/stretch-iphone-to-its-limit-a-2gib-model-that-can-draw-everything-in-your-pocket/
Every year, we have a new iPhone that claims to be faster and better in every way. And yes, these new computer vision models and new image sensors can...
πŸ” View Similar Articles 🟠 HN
πŸ” 51.2% similar
Hyperspace Update
http://hypercritical.co/2025/05/01/hyperspace-update
Hypercritical Hyperspace Update Two months ago, I launched Hyperspace, a Mac app for reclaiming disk space without removing files. The feature set of ...
πŸ” View Similar Articles
πŸ” 51.0% similar
I want everything local – Building my offline AI workspace
https://instavm.io/blog/building-my-offline-ai-workspace
I want everything local β€” no cloud, no remote code execution. That’s what a friend said. That one-line requirement, albeit simple, would need multiple...
πŸ” View Similar Articles 🟠 HN
πŸ” 50.9% similar
Scripts I wrote that I use all the time
https://evanhahn.com/scripts-i-wrote-that-i-use-all-the-time/
Scripts I wrote that I use all the time In my decade-plus of maintaining my dotfiles, I’ve written a lot of little shell scripts. Here’s a big list of...
πŸ” View Similar Articles 🟠 HN
πŸ” 50.6% similar
LESSWRONG LW
https://www.lesswrong.com/posts/dxiConBZTd33sFaRC/field-notes-from-shipping-real-code-with-claude
Shimmering Substance - Jackson Pollock Think of this post as your field guide to a new way of building software. Let me take you back to when this all...
πŸ” View Similar Articles 🟠 HN