Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Container Security
Sandboxing, Isolation, Seccomp, Capabilities, Rootless Containers
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
202093
posts in
37.7
ms
EBCC
:
Enclave-Backed
Confidential Containers via OCI-Compatible Runtime Integration
🔒
Runtime Security
arxiv.org
·
1d
Contained
Sandboxing
for AI Agents
🔒
Runtime Security
greywall.io
·
8h
rootless-containers/rootlesskit
: Linux-native "fake root" for implementing rootless
containers
📦
Namespaces
github.com
·
5d
When configuration becomes a vulnerability:
Exploitable
misconfigurations
in AI apps
🛡️
AI Security
microsoft.com
·
16h
Developer
workstations
are the new
beachhead
🔒
Runtime Security
csoonline.com
·
2d
The three pillars of trust: The
hardened
OpenShift
foundation
🔐
Secure Enclaves
redhat.com
·
3d
Fedora
Hummingbird
brings the container security model to a Linux host OS
🔒
Runtime Security
helpnetsecurity.com
·
2d
How To Get Started With
Kubernetes
: A
Practical
Guide
🌊
Streaming Systems
mlops.community
·
1d
Sophos
Endpoint
in action: Blocking a novel supply chain attack
🚧
Execution Guardrails
sophos.com
·
3d
Kubernetes
in Action, 2nd Ed (
Manning
)
🏗️
System Design
i-programmer.info
·
1d
Cloud native application challenges:
installing
the walking
skeleton
📦
Package Managers
thenewstack.io
·
1d
Java
Code Isn’t the Problem - The
Container
Is
🔒
Runtime Security
cloudnativenow.com
·
3d
Show HN:
Headless
Cloud Security –
Headless
SaaS
has come to security
☁️
Cloud Computing
sysdig.com
·
1d
·
Hacker News
How Open Source Dependency and
Repo
Attacks
Compromise
DevOps Pipelines and How to Stay Safe
🏭
Supply Chain
devops.com
·
3d
enix/x509-certificate-exporter
: A Prometheus exporter for X.509 certificates, built for Kubernetes first but
equally
happy as a standalone binary
📦
Software Supply Chain
github.com
·
2d
·
Hacker News
Kubernetes
in production: how to keep the
standard
without taking on all its operations
🌊
Streaming Systems
clever.cloud
·
1d
ExploitBench
: A Capability
Ladder
Benchmark for LLM Cybersecurity Agents
🛡️
Exploit Mitigations
arxiv.org
·
2h
LLMs for Secure Hardware Design and
Related
Problems:
Opportunities
and Challenges
🕳
LLM Vulnerabilities
arxiv.org
·
3d
CLOUDBURST
: Cloud-Layer Observations Using
Beacons
for Unified Real-time Surveillance and Threat Attribution
☁️
Cloudflare
arxiv.org
·
1d
From
Controlled
to the Wild: Evaluation of
Pentesting
Agents for the Real-World
🛡️
AI Security
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help