Links
Add
Broken
CS 193P iPhone Application Development
http://www.stanford.edu/class/cs193p/cgi-bin/drupal/
Added 1 month ago
CUE
https://cuelang.org/
Configure Unify Execute Validate, define, and use dynamic and text‑based dataLearn more Get started with CUE CUE makes it easy to validate data, write schemas, …
Added 1 month ago
Custom Prometheus Metrics for Apps Running in Kubernetes
https://medium.com/@zhimin.wen/custom-prometheus-metrics-for-apps-running-in-kubernetes-498d69ada7aa
Added 1 month ago
CVE Foundation
https://www.thecvefoundation.org/home
The Common Vulnerabilities and Exposures (CVE) Program has become the cornerstone of vulnerability management. Nearly all technology vendors and service providers identify vulnerabilities with CVEs when they publish security advisories. Most security products and services related to vulnerabilities
Added 1 month ago
CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo
https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html
After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.
Added 1 month ago
cv-template (responsive)
https://codepen.io/erictreacy/pen/EbWmbY?css-preprocessor=scss
Added 1 month ago
Cyber ransom payments will need to be disclosed by businesses under new law
https://www.abc.net.au/news/2024-07-30/cyber-ransom-payments-new-laws-before-parliament/104113038
Australian businesses are paying untold amounts in ransom to hackers but the government hopes to regain some control with a landmark cybersecurity law.
Added 1 month ago
Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories | Sysdig
https://sysdig.com/blog/insecure-github-actions-found-in-mitre-splunk-and-other-open-source-repositories/
Since its founding, the Sysdig Threat Research Team (TRT) has been committed to making the world a safer, more informed place. Upholding this commitment
Darktable 2.4.0 released
https://www.darktable.org/2017/12/darktable-240-released/
Added 1 month ago
Data Driven Decisions - Amazon Web Services (AWS)
https://aws.amazon.com/campaigns/data-driven-decisions/
Make more informed decisions, improve operations, and differentiate with generative AI
date - Why does man print "gimme gimme gimme" at 00:30? - Unix & Linux Stack Exchange
https://unix.stackexchange.com/questions/405783/why-does-man-print-gimme-gimme-gimme-at-0030
Added 1 month ago
David McCormack on Custard’s new album – and living in Bluey’s shadow
https://www.theguardian.com/music/2024/oct/11/david-mccormack-custard-new-album-suburban-curtains-interview-bluey
Dead Reckoning
https://www.damninteresting.com/dead-reckoning/
The 18th century misadventures of HMS Wager and her reluctant crew
Added 1 month ago
Dear Ai - make me a video about skateboarding with the boys? - YouTube
https://www.youtube.com/watch?v=NBYa0cTEyBc
Deceptive defense: best practices for identity based honeytokens in Microso
https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/deceptive-defense-best-practices-for-identity-based-honeytokens/ba-p/3851641
DeepSeek Jailbreak Reveals Its Entire System Prompt
https://www.darkreading.com/application-security/deepseek-jailbreak-system-prompt
Added 1 month ago
DeepSeek Local: How to Self-Host DeepSeek (Privacy and Control)
https://linuxblog.io/deepseek-local-self-host/
By following this guide, you will be able to successfully self-host your preferred DeepSeek model on a home lab or home office server, harnessing the
Added 1 month ago
Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack
https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/
In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
Added 4 weeks ago
Deploying Elasticsearch Within Kubernetes | Rancher Labs
https://rancher.com/blog/2018/2018-11-22-deploying-elasticsearch/
Added 1 month ago
Deprecation notice: GitHub Pages actions to require artifacts actions v4 on GitHub.com - GitHub Chan
https://github.blog/changelog/2024-12-05-deprecation-notice-github-pages-actions-to-require-artifacts-actions-v4-on-github-com/
What’s Changing On January 30, 2025, the actions/upload-artifact and actions/download-artifact actions will be deprecated and no longer supported. These actions are being replaced with v4 versions, offering improved performance and…
Design flaw has Microsoft Authenticator overwriting MFA accounts
https://www.csoonline.com/article/3480918/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out.html
Microsoft stands out from the authenticator crowd by annihilating accounts when new accounts are introduced via QR code. Despite user complaints for years, no fix has been issued, leaving IT experts wondering, ‘Why would you pick Microsoft?’
Designing Blue Team playbooks with Wazuh for proactive incident response
https://www.bleepingcomputer.com/news/security/designing-blue-team-playbooks-with-wazuh-for-proactive-incident-response/
Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.