Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@primonatura@mstdn.social
2025-06-05 13:00:13

"Critically endangered chameleon discovered outside its known habitat in Madagascar"
#Madagascar #Animals

@metacurity@infosec.exchange
2025-08-04 13:57:09

CrowdStrike released its annual threat hunting report showing that we're in a new era of cyberattacks from sophisticated attackers who rely on clever social engineering, AI, and devices outside of IT's purview.
Check out my latest CSO piece for more details and tips on how defenders can better guard against these threats.
CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here

@arXiv_csAI_bot@mastoxiv.page
2025-09-05 09:56:01

Meta-Policy Reflexion: Reusable Reflective Memory and Rule Admissibility for Resource-Efficient LLM Agent
Chunlong Wu, Zhibo Qu
arxiv.org/abs/2509.03990

@arXiv_csCV_bot@mastoxiv.page
2025-08-04 13:23:15

Replaced article(s) found for cs.CV. arxiv.org/list/cs.CV/new
[1/4]:
- CPCL: Cross-Modal Prototypical Contrastive Learning for Weakly Supervised Text-based Person Retri...
Xinpeng Zhao, Yanwei Zheng, Chuanlin Lan, Xiaowei Zhang, Bowen Huang, Jibin Yang, Dongxiao Yu

@arXiv_mathph_bot@mastoxiv.page
2025-09-01 08:54:53

Finite $N$ precursors of the free cumulants
Sylvain Lacroix, Jean-Bernard Zuber
arxiv.org/abs/2508.21483 arxiv.org/pdf/2508.21483

@metacurity@infosec.exchange
2025-06-05 17:05:09

Check out my latest CSO piece, which examines how Trump’s nominees for national cyber director and CISA director will face shared challenges but different prospects in coping with unprecedented reductions in cyber personnel across the federal government.
Many thanks to Michael Daniel of the Cyber Threat Alliance and Mark Montgomery of FDD for their help and insight.
Daniel made a point about Trump's cutbacks on cyber spending, a situation that most cyber folks haven't see…

@arXiv_csAR_bot@mastoxiv.page
2025-08-04 07:31:40

E2ATST: A Temporal-Spatial Optimized Energy-Efficient Architecture for Training Spiking Transformer
Yunhao Ma, Yanyu Lin, Mingjing Li, Puli Quan, Chenlin Zhou, Wenyue Zhang, Zhiwei Zhong, Wanyi Jia, Xueke Zhu, Qingyan Meng, Huihui Zhou, Fengwei An
arxiv.org/abs/2508.00475

@adlerweb@social.adlerweb.info
2025-07-03 16:55:33

Na das üben wir aber nochmal, lieber {$randomVendor}. Ich kaufe ein "f". XD
"Lieber {$channelName}, Ich hoffe, diese E-Mail bringt dir gute Wünsche.[…]Deshalb möchte ich Sie einladen, ein YouTube-Shopping-Video für XXXXX-Produkte zu erstellen."

@arXiv_mathCO_bot@mastoxiv.page
2025-09-03 13:14:53

Monochromatic components with many edges in random graphs
Hannah Fox, Sammy Luo
arxiv.org/abs/2509.01766 arxiv.org/pdf/2509.01766

@metacurity@infosec.exchange
2025-07-01 12:57:04

Detecting, intercepting, and ejecting adversaries is getting harder as cybercriminals move faster and smarter.
Check out my latest CSO piece on how CISOs need to rethink their digital playbooks in light of these trends.
Thanks to Matt Immler of Okta, Tom Etheridge of CrowdStrike and Pierre Cadieux of Cisco Talos for their insight.