Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
runningmike's submissions
login
1.
OWASP Foundation's Strategic Plan [pdf]
(
owasp.org
)
3 points
by
runningmike
4 days ago
|
past
|
1 comment
2.
ChatGPT, Is This Real?
(
arxiv.org
)
2 points
by
runningmike
25 days ago
|
past
|
1 comment
3.
Security Concerns in Generative AI Coding Assistants
(
arxiv.org
)
1 point
by
runningmike
27 days ago
|
past
|
1 comment
4.
Can LLMs Hack Enterprise Networks?
(
github.com/andreashappe
)
3 points
by
runningmike
55 days ago
|
past
|
1 comment
5.
Static Application Security Testing (SAST): Simplicity Matters
(
nocomplexity.substack.com
)
2 points
by
runningmike
58 days ago
|
past
6.
Unlocking Python's Cores:Energy Implications of Removing the GIL
(
arxiv.org
)
132 points
by
runningmike
66 days ago
|
past
|
103 comments
7.
Security Is Not Enough
(
arxiv.org
)
2 points
by
runningmike
67 days ago
|
past
8.
Security Risks of AI Agents Hiring Humans: An Empirical Marketplace Study
(
arxiv.org
)
1 point
by
runningmike
75 days ago
|
past
|
1 comment
9.
Simplify IT: The art and science towards simpler IT solutions(2025)[pdf]
(
nocomplexity.com
)
2 points
by
runningmike
81 days ago
|
past
|
1 comment
10.
From Hours to Seconds: Automating Python Security with AI?
(
nocomplexity.substack.com
)
1 point
by
runningmike
3 months ago
|
past
11.
The Return of NASA's SpaceX Crew-11
(
nasa.gov
)
2 points
by
runningmike
3 months ago
|
past
12.
A Data-Driven Analysis of PyCon Talks on Security
(
nocomplexity.substack.com
)
1 point
by
runningmike
4 months ago
|
past
13.
Simple Is a Scam
(
nocomplexity.substack.com
)
9 points
by
runningmike
4 months ago
|
past
|
1 comment
14.
LLM Learning Resources
(
nocomplexity.com
)
2 points
by
runningmike
4 months ago
|
past
|
1 comment
15.
Vulnerability Databases: The Holy Grail of Cybersecurity?
(
nocomplexity.substack.com
)
1 point
by
runningmike
4 months ago
|
past
16.
GIJN's Top Investigative Tools of 2025
(
gijn.org
)
3 points
by
runningmike
4 months ago
|
past
|
1 comment
17.
The Politics of Superintelligence
(
noemamag.com
)
4 points
by
runningmike
5 months ago
|
past
18.
The AI-Fication of Cyberthreats
(
trendmicro.com
)
2 points
by
runningmike
5 months ago
|
past
19.
Launch-Day Diffusion: Tracking Hacker News Impact on GitHub Stars for AI Tools
(
arxiv.org
)
2 points
by
runningmike
5 months ago
|
past
|
1 comment
20.
AI Hype TRAcking Project
(
poritz.net
)
2 points
by
runningmike
5 months ago
|
past
21.
PyOpenSci Python Package Guide
(
pyopensci.org
)
6 points
by
runningmike
5 months ago
|
past
|
2 comments
22.
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
(
nocomplexity.substack.com
)
1 point
by
runningmike
5 months ago
|
past
23.
DySec: Is a Python Package a Hacker Trap?
(
nocomplexity.com
)
1 point
by
runningmike
5 months ago
|
past
24.
Preparing for Launch
(
ifp.org
)
2 points
by
runningmike
5 months ago
|
past
25.
Enisa threat landscape 2025 [pdf]
(
europa.eu
)
2 points
by
runningmike
6 months ago
|
past
|
1 comment
26.
Python Code Under Fire: Hidden Security Risks
(
nocomplexity.com
)
3 points
by
runningmike
6 months ago
|
past
|
2 comments
27.
New Glenn Mission NG-2
(
blueorigin.com
)
4 points
by
runningmike
6 months ago
|
past
|
2 comments
28.
Tech Trends Report 2026
(
surf.nl
)
1 point
by
runningmike
6 months ago
|
past
|
1 comment
29.
Netherlands cracks down on China-owned chip firm over security risk
(
bbc.com
)
26 points
by
runningmike
7 months ago
|
past
|
10 comments
30.
Python 3.14.0 is now available
(
python.org
)
24 points
by
runningmike
7 months ago
|
past
|
11 comments
More
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: