Hacker Newsnew | past | comments | ask | show | jobs | submit | runningmike's submissionslogin
1.OWASP Foundation's Strategic Plan [pdf] (owasp.org)
3 points by runningmike 4 days ago | past | 1 comment
2.ChatGPT, Is This Real? (arxiv.org)
2 points by runningmike 25 days ago | past | 1 comment
3.Security Concerns in Generative AI Coding Assistants (arxiv.org)
1 point by runningmike 27 days ago | past | 1 comment
4.Can LLMs Hack Enterprise Networks? (github.com/andreashappe)
3 points by runningmike 55 days ago | past | 1 comment
5.Static Application Security Testing (SAST): Simplicity Matters (nocomplexity.substack.com)
2 points by runningmike 58 days ago | past
6.Unlocking Python's Cores:Energy Implications of Removing the GIL (arxiv.org)
132 points by runningmike 66 days ago | past | 103 comments
7.Security Is Not Enough (arxiv.org)
2 points by runningmike 67 days ago | past
8.Security Risks of AI Agents Hiring Humans: An Empirical Marketplace Study (arxiv.org)
1 point by runningmike 75 days ago | past | 1 comment
9.Simplify IT: The art and science towards simpler IT solutions(2025)[pdf] (nocomplexity.com)
2 points by runningmike 81 days ago | past | 1 comment
10.From Hours to Seconds: Automating Python Security with AI? (nocomplexity.substack.com)
1 point by runningmike 3 months ago | past
11.The Return of NASA's SpaceX Crew-11 (nasa.gov)
2 points by runningmike 3 months ago | past
12.A Data-Driven Analysis of PyCon Talks on Security (nocomplexity.substack.com)
1 point by runningmike 4 months ago | past
13.Simple Is a Scam (nocomplexity.substack.com)
9 points by runningmike 4 months ago | past | 1 comment
14.LLM Learning Resources (nocomplexity.com)
2 points by runningmike 4 months ago | past | 1 comment
15.Vulnerability Databases: The Holy Grail of Cybersecurity? (nocomplexity.substack.com)
1 point by runningmike 4 months ago | past
16.GIJN's Top Investigative Tools of 2025 (gijn.org)
3 points by runningmike 4 months ago | past | 1 comment
17.The Politics of Superintelligence (noemamag.com)
4 points by runningmike 5 months ago | past
18.The AI-Fication of Cyberthreats (trendmicro.com)
2 points by runningmike 5 months ago | past
19.Launch-Day Diffusion: Tracking Hacker News Impact on GitHub Stars for AI Tools (arxiv.org)
2 points by runningmike 5 months ago | past | 1 comment
20.AI Hype TRAcking Project (poritz.net)
2 points by runningmike 5 months ago | past
21.PyOpenSci Python Package Guide (pyopensci.org)
6 points by runningmike 5 months ago | past | 2 comments
22.PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python (nocomplexity.substack.com)
1 point by runningmike 5 months ago | past
23.DySec: Is a Python Package a Hacker Trap? (nocomplexity.com)
1 point by runningmike 5 months ago | past
24.Preparing for Launch (ifp.org)
2 points by runningmike 5 months ago | past
25.Enisa threat landscape 2025 [pdf] (europa.eu)
2 points by runningmike 6 months ago | past | 1 comment
26.Python Code Under Fire: Hidden Security Risks (nocomplexity.com)
3 points by runningmike 6 months ago | past | 2 comments
27.New Glenn Mission NG-2 (blueorigin.com)
4 points by runningmike 6 months ago | past | 2 comments
28.Tech Trends Report 2026 (surf.nl)
1 point by runningmike 6 months ago | past | 1 comment
29.Netherlands cracks down on China-owned chip firm over security risk (bbc.com)
26 points by runningmike 7 months ago | past | 10 comments
30.Python 3.14.0 is now available (python.org)
24 points by runningmike 7 months ago | past | 11 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: