🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Security

hacking, redteam, cracking

Understanding the Security Landscape of MCP
apideck.com·9h·
Discuss: Hacker News
⚡high performance
Cryptoasset Realization: How Cryptocurrencies Are Frozen, Seized, and Forfeited
chainalysis.com·13h·
Discuss: Hacker News
⚡high performance
Red Teams Jailbreak GPT-5 with Ease, Warn It's 'Nearly Unusable' for Enterprise
securityweek.com·2d·
Discuss: Hacker News
⚡high performance
DEF CON hackers plug security holes in US water systems amid tsunami of threats
theregister.com·19h·
Discuss: Hacker News
⚡high performance
Improving Geographical Resilience For Distributed Open Source Teams with FREON
soatok.blog·1d·
Discuss: Lobsters, Hacker News
⚡high performance
Cheaters Spotted in Battlefield 6 Beta, Despite Secure Boot Requirement
ign.com·1d·
Discuss: Hacker News
🟪Programming
A Full-Chain Exploit of an Unfused Qualcomm Device
hhj4ck.github.io·3d·
Discuss: Lobsters, Hacker News
⚡high performance
Security flaws in a carmaker's web portal let hacker remotely unlock cars
techcrunch.com·7h·
Discuss: Hacker News
🟪Programming
Exploring Traces: Agent trajectory walkthroughs from interesting examples
theori.io·1d·
Discuss: Hacker News
🟪Programming
Claude is competitive with humans in (some) cyber competitions
red.anthropic.com·13h·
Discuss: Hacker News
⚡high performance
GreedyBear: 650 Attack Tools, One Coordinated Campaign
blog.koi.security·3d·
Discuss: Hacker News
⚡high performance
How does Tor work? (2023)
skerritt.blog·2d·
Discuss: Hacker News
⚡high performance
My Lethal Trifecta talk at the Bay Area AI Security Meetup
simonwillison.net·2d·
Discuss: Hacker News
🟪Programming
Show HN: GemGuard: Ruby gem to scan and auto-fix vulnerable dependencies
github.com·3h·
Discuss: Hacker News
⚡high performance
The inside story of the Telemessage saga, and how you can view the data
theregister.com·1d·
Discuss: Hacker News
🟪Programming
Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds
wired.com·2d·
Discuss: Hacker News
⚡high performance
HTTP/2: The Sequel is Always Worse
portswigger.net·1d·
Discuss: Hacker News, r/programming
🟪Programming
Researchers Uncover RCE Attack Chains in HashiCorp Vault and CyberArk Conjur
csoonline.com·4d·
Discuss: Hacker News
⚡high performance
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
socket.dev·3d·
Discuss: Hacker News
🟪Programming
Security by Compartmentalization for AI Coding Agents on NixOS
sourcery.zone·32m·
Discuss: Hacker News
🟪Programming
Loading...Loading more...
AboutBlogChangelogRoadmap