CodeAutonomous's profile picture. Cybersecurity | AI | Aviation |

Code Autonomous🪂

@CodeAutonomous

Cybersecurity | AI | Aviation |

Code Autonomous🪂 memposting ulang

The @DeptofWar’s New Critical Technology Areas: 🤖 Applied Artificial Intelligence ⚛️ Quantum & Battlefield Information Dominance 🧬 Biomanufacturing 🚛 Contested Logistics Technologies ⚡ Scaled Directed Energy 🚀 Scaled Hypersonics Technological dominance loading…

The national security challenges we face today demand that the @DeptofWar innovate with uncompromising speed. Proven, tangible technologies must be placed into the hands of our warfighters so they never face a fair fight. That’s why today I’m announcing the @DeptofWar’s new…



100% 👇 Besides, work-life balance is meaningless if you truly love what you do

Please do NOT come work for any company I have founded or am investing in if this LMT pro-mediocracy ad appeals to you. We are deterring our adversaries to save millions of lives, and reshoring to build the next American century. Not whatever this is.

JTLonsdale's tweet image. Please do NOT come work for any company I have founded or am investing in if this LMT pro-mediocracy ad appeals to you.

We are deterring our adversaries to save millions of lives, and reshoring to build the next American century. Not whatever this is.


Code Autonomous🪂 memposting ulang

#APT42 Uses fake conference pages to capture credentials, redirects to OneDrive WebDAV shares, downloads LNK files disguised as PDFs, executes curl commands to fetch batch scripts (Temp.bat) from Cloudflare Workers, and loads the PowerShell-based TAMECAT backdoor: A modular,…

blackorbird's tweet image. #APT42
Uses fake conference pages to capture credentials, redirects to OneDrive WebDAV shares, downloads LNK files disguised as PDFs, executes curl commands to fetch batch scripts (Temp.bat) from Cloudflare Workers, and loads the PowerShell-based TAMECAT backdoor:
A modular,…

Code Autonomous🪂 memposting ulang

NVIDIA's $1 billion investment in Nokia to build an AI-powered 6G network is a significant signal for the future of infrastructure with AI.


Code Autonomous🪂 memposting ulang

The November 2025 security updates are available:

Security updates for November 2025 are now available! Details are here: msft.it/6018SZEg0 #PatchTuesday #SecurityUpdateGuide

msftsecresponse's tweet image. Security updates for November 2025 are now available! Details are here: msft.it/6018SZEg0
 
#PatchTuesday #SecurityUpdateGuide


Code Autonomous🪂 memposting ulang

Dive into the heart of threat intelligence as Principal Security Researcher @yo_yo_yo_jbo reveals how proactive security research powers Microsoft’s defenses: msft.it/6016tJxce. The relentless hunt for vulnerabilities—like the HM Surf exploit—spotlights how research doesn’t…


Yaaaay 🎉🥳 If can be of any help in the San Diego area let me know @benln. Cheers!

Cafe Cursor is coming to: • London • Buenos Aires • Montreal • Stockholm • Mexico City • Toronto • Chiang Mai • Bangalore • Bangkok • San Diego Stay tuned!



Code Autonomous🪂 memposting ulang

🏦 AI Bank Statement Analyzer (Made by the LangChain Community) Transform bank statements into queryable financial insights using AI. This system combines YOLO and LangChain's RAG to enable natural language analysis of your personal finances. Check it out here ⚡…

LangChainAI's tweet image. 🏦 AI Bank Statement Analyzer

(Made by the LangChain Community)

Transform bank statements into queryable financial insights using AI. This system combines YOLO and LangChain's RAG to enable natural language analysis of your personal finances.

Check it out here ⚡…

Code Autonomous🪂 memposting ulang

You asked for it. We built it. A library of architectural diagrams that show practical ways to build pipelines, dashboards, and AI models. Find designs for common data and AI builds across use cases and industries, including: - Data Ingestion - AI Security Framework - Next Best…

databricks's tweet image. You asked for it. We built it. A library of architectural diagrams that show practical ways to build pipelines, dashboards, and AI models.

Find designs for common data and AI builds across use cases and industries, including:
- Data Ingestion
- AI Security Framework
- Next Best…

Code Autonomous🪂 memposting ulang

Three large #drones conducted targeted surveillance over Belgium’s #KleineBrogel airbase—which stores US #nuclear weapons—on the night of November 1-2, 2025, evading Belgian military #drone jammers and police helicopter pursuit in what Defense Minister... dronexl.co/2025/11/02/bra…


Code Autonomous🪂 memposting ulang

🔍 OpenAI released Aardvark - an autonomous security agent powered by GPT-5 that hunts for vulnerabilities in code 🧵 Been waiting for them to do this.... openai.com/index/introduc…


Code Autonomous🪂 memposting ulang

The old paradigm: go to a good school, get a degree and get a good job... is dead. The new paradigm: find your purpose, start a company, create and lead is our future Entrepreneurship is the only future career .


As an engineer crunching growth models daily, Prof. Albert Bartlett's "bacteria in a bottle" demo is a brutal wake-up: Exponential growth isn't linear—it's a system killer. Rule of 70 says 1% doubles in 70 years. Recalibrate your forecasts NOW.Mind-blowing watch:…

CodeAutonomous's tweet card. Our inability to understand the exponential function is our biggest...

youtube.com

YouTube

Our inability to understand the exponential function is our biggest...


🚀 The #USAF's Collaborative Combat Aircraft (CCA) program is transforming the future of air dominance! With AI-powered autonomous drones teaming with 5th/6th gen fighters, the CCA initiative aims for scalable, cost-effective airpower to outpace threats. First CCAs expected in…


Code Autonomous🪂 memposting ulang

CVE-2025-59287 is being actively exploited. Update Windows Server Update Services now to reduce risk of a threat actor achieving remote code execution with system privileges. See our Alert for details ➡️ go.dhs.gov/in5 #Cybersecurity


Code Autonomous🪂 memposting ulang

Get Rich Scheme For Techies - practice training small LLMs - produce a small LLM (3B model) that is SOTA - use common crawl data for pre-training - perform some basic fine-tuning with open-source, good-quality datasets - make a post on X and show off your benchmarks - create a…


Code Autonomous🪂 memposting ulang

Azure Blob Storage is a high-value target for threat actors due to its critical role in storing and managing massive amounts of unstructured data at scale across diverse workloads: msft.it/6012s7pip. Threat actors are actively seeking opportunities to compromise…


Code Autonomous🪂 memposting ulang

We’re acquiring @Arduino to make edge computing and #AI more accessible. Arduino will remain independent, supporting multiple silicon vendors and its community. Launching today: Arduino UNO Q, powered by Qualcomm #Dragonwing. Discover more: bit.ly/4nE0rP2

Qualcomm's tweet image. We’re acquiring @Arduino to make edge computing and #AI more accessible. Arduino will remain independent, supporting multiple silicon vendors and its community. Launching today: Arduino UNO Q, powered by Qualcomm #Dragonwing. Discover more: bit.ly/4nE0rP2

Code Autonomous🪂 memposting ulang

TONS OF MODELS ROLLING OUT TO CHATLLM AND DEEPAGENT TODAY - GLM 4.6 - GPT-5 Pro - Image Gen - Sora 2 All coming by the end of the day!!


United States Tren

Loading...

Something went wrong.


Something went wrong.