Feeds to Scour
SubscribedAll
Scoured 77976 posts in 866.8 ms
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท8h
๐Ÿ›ก๏ธTaint Analysis
Preview
Report Post
Safety VS Security
dev.toยท11hยท
Discuss: DEV
๐Ÿ”Security Types
Preview
Report Post
Design Decision for Role-Based Access Control (RBAC)
cyberark.comยท6hยท
Discuss: DEV
๐Ÿ›ก๏ธCapability Security
Preview
Report Post
Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard -- the POST/Artifact use case
arxiv.orgยท15h
๐Ÿ”Capability Calculus
Preview
Report Post
Group Note Drafts: Threat Modeling Guide and Threat Model for Decentralized Credentials
w3.orgยท1d
๐Ÿ”Capability Calculus
Preview
Report Post
Call for Participation - ICANN DNSSEC and Security Workshop for the ICANN 85 Community Forum
circleid.comยท3h
๐Ÿ”Capability Protocols
Preview
Report Post
What Is Data Leakage
securityscorecard.comยท3h
๐Ÿ”Security Types
Preview
Report Post
How do we make sure AI is fair, safe, and secure?
techxplore.comยท5h
๐ŸฐCapability Machines
Preview
Report Post
How to Break Any AI Model (A Machine Learning Security Crash Course)
dev.toยท4hยท
Discuss: DEV
๐Ÿš‚Error Propagation
Preview
Report Post
Sandboxing
code.claude.comยท4hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCapability VMs
Preview
Report Post
Questions regarding a private threat model...
discuss.privacyguides.netยท18h
๐Ÿ›ก๏ธCapability Security
Preview
Report Post
Threat hunters canโ€™t waste time stumbling in the dark โ€“ they need real observability
techradar.com
ยท1d
๐Ÿ”Security Types
Preview
Report Post
GNU C Language Manual
gnu.orgยท1h
๐Ÿช„C Metaprogramming
Preview
Report Post
The Sidecar Siphon: Exploiting Identity Leaks in Service Mesh Architectures
instatunnel.myยท8hยท
Discuss: r/programming
๐Ÿ›ก๏ธCapability VMs
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.comยท22hยท
Discuss: Hacker News
โœ…Configuration Validation
Preview
Report Post
Weaponizing Calendar Invites: How Prompt Injection Bypassed Google Geminiโ€™s Controls
miggo.ioยท7hยท
Discuss: Hacker News
๐Ÿ›ก๏ธParser Security
Preview
Report Post
Investigating @sp1ritfyre: A Security Blue Team OSINT Challenge
medium.comยท1h
๐Ÿ”Security Types
Preview
Report Post
MirrorGuard: Toward Secure Computer-Use Agents via Simulation-to-Real Reasoning Correction
arxiv.orgยท15h
๐ŸฐCapability Machines
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.comยท6h
๐Ÿ”Security Types
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help