Feeds to Scour
SubscribedAll
Scoured 77889 posts in 955.1 ms
Design Decision for Role-Based Access Control (RBAC)
cyberark.com·17h·
Discuss: DEV
🛡️Security Type Systems
Preview
Report Post
Eliciting Harmful Capabilities by Fine-Tuning On Safeguarded Outputs
arxiv.org·1d
🏰Capability Machines
Preview
Report Post
Sandboxing
code.claude.com·15h·
Discuss: Hacker News
🛡️Capability VMs
Preview
Report Post
Digital hygiene
karpathy.bearblog.dev·10h
🔐Security Types
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·54m·
Discuss: Hacker News
🏰Capability Machines
Preview
Report Post
Safety VS Security
dev.to·22h·
Discuss: DEV
🛡️Security Type Systems
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·1d·
Discuss: Hacker News
Configuration Validation
Preview
Report Post
What is API Security?
securityscorecard.com·14h
🔧API Design
Preview
Report Post
A new era of agents, a new era of posture
microsoft.com·17h
🛡️Security Type Systems
Preview
Report Post
CAP Theorem Explained: Beyond the "Pick Two" Myth
blog.ahmazin.dev·1h·
Discuss: Hacker News
πPi Calculus
Preview
Report Post
Questions regarding a private threat model...
discuss.privacyguides.net·1d
🛡️Security Type Systems
Preview
Report Post
Secure Boot, TPM and Anti-Cheat Engines
andrewmoore.ca·1h·
Discuss: Lobsters
🏷️Memory Tagging
Preview
Report Post
OWASP Mobile Application Security Explained: How to Put MASVS, MASTG and MASWE Into Practice
nowsecure.com·19h
🔧WASI
Preview
Report Post
Misconfigured demo environments are turning into cloud backdoors to the enterprise
csoonline.com·9h
🛡️Security Type Systems
Preview
Report Post
Practical Protection: Getting Started with Power Platform Security
practical365.com·2d
🛡️Capability VMs
Preview
Report Post
Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard -- the POST/Artifact use case
arxiv.org·1d
🛡️Security Type Systems
Preview
Report Post
The Wasm Breach: Escaping Backend WebAssembly Sandboxes
instatunnel.my·2d·
🌐WASM Runtimes
Preview
Report Post
Auth Bottleneck Architecture – Streamline Authentication Across Applications
fusionauth.io·1d·
Discuss: Hacker News
🛡️Capability VMs
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·15h
🛡️Parser Security
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help