Feeds to Scour
SubscribedAll
Scoured 4410 posts in 39.7 ms
Access Fabric: A modern approach to identity and network access
microsoft.comยท1d
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Show HN: LogShield โ€“ Deterministic CLI tool to sanitize secrets from logs
logshield.devยท4hยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Exposing A2A API for Your Amazon Bedrock AgentCore Agent Within VPC
pub.towardsai.netยท5h
๐Ÿ›ก๏ธCapability VMs
Preview
Report Post
Beyond RC4 for Windows Authentication
microsoft.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Mistakes marred Australian telco firewall upgrade, contributing to deaths
theregister.comยท5hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Ergonomics
Preview
Report Post
Buying Intelligence and Reviews for Enterprise Technology
peerspot.comยท15h
๐Ÿ›ก๏ธCybersecurity
Preview
Report Post
Frontier AI Trends Report by The AI Security Institute (AISI)
aisi.gov.ukยท18hยท
Discuss: Hacker News
๐Ÿง Symbolic AI
Preview
Report Post
How a VPN works (and why you should care)
engadget.comยท1d
โšกQUIC Protocol
Preview
Report Post
Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance
arxiv.orgยท13hยท
Discuss: Lobsters
๐ŸฐCapability Machines
Preview
Report Post
The Breachies 2025: The Worst, Weirdest, Most Impactful Data Breaches of the Year
eff.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธCybersecurity
Preview
Report Post
Show HN: Writing a networking stack for xv6 in Rust
alessandroferrari.liveยท1dยท
Discuss: Hacker News
๐ŸŒMinimal HTTP
Preview
Report Post
Traffic Shaping: alienghic โ€” LiveJournal
alienghic.livejournal.comยท1d
โšกQUIC Protocol
Preview
Report Post
OSINT Field Notes #1 - DIY Power Grid Map, Great Firewall Leak & Birds Eye View Tool
osintfieldnotes.substack.comยท1dยท
Discuss: Substack
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
New Microsoft e-book: 3 reasons point solutions are holding you back | Microsoft Security Blog
microsoft.comยท17h
๐Ÿ›ก๏ธSecurity Type Systems
Preview
Report Post
Sieve: A Mail Filtering Language
ietf.orgยท1d
๐Ÿ“šFactor
Preview
Report Post
Improving modern software supply chain security with Red Hat
redhat.comยท1d
๐Ÿ“ฆDependency Analysis
Preview
Report Post
Pam Like a Pro. Lock yourself out of your Linux machine, then get back in
collininfosec.comยท2dยท
Discuss: Hacker News
๐Ÿ’ปTerminal Tools
Preview
Report Post
OSINT Industries | Powerful Tools For Online Investigations
osint.industriesยท1d
๐Ÿ”ŽInformation Retrieval
Preview
Report Post
Ubikron โ€“ next generation OSINT Tool
ubikron.comยท1d
๐Ÿง Obsidian
Preview
Report Post
VPN service that's fast, reliable, & effective | Windscribe
windscribe.comยท1d
โšกQUIC Protocol
Preview
Report Post