Feeds to Scour
SubscribedAll
Scoured 78172 posts in 1.82 s
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.comยท10h
๐Ÿ”Static Analysis
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.ioยท1d
๐Ÿ“œBytecode Interpreters
Preview
Report Post
Multi-Agent Taint Specification Extraction for Vulnerability Detection
arxiv.orgยท2d
๐ŸงชParser Testing
Preview
Report Post
What Is Data Leakage
securityscorecard.comยท4h
๐Ÿ”Security Types
Preview
Report Post
Dissecting Digital Viruses: My First Steps in Malware Analysis
dev.toยท1dยท
Discuss: DEV
๐Ÿ”“Decompilers
Preview
Report Post
Logs Are Not Enough
hashrocket.substack.comยท5hยท
Discuss: r/programming
๐Ÿ“ŠLog Parsers
Preview
Report Post
How CyberArk Protects AI Agents with Instruction Detectors and History-Aware Validation
infoq.comยท1d
๐Ÿ”„Subinterpreters
Preview
Report Post
Introducing CVE-Alert: Free Real-Time Vulnerability Tracking by Dataforge
dev.toยท1hยท
Discuss: DEV
๐Ÿ”Execution Tracing
Preview
Report Post
From Recon To Response: OSINTโ€™s Role In Cyber Defense
redfoxsecurity.medium.comยท1d
๐Ÿ”Security Types
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.comยท8h
๐Ÿ›ก๏ธParser Security
Preview
Report Post
Heaps do lie: debugging a memory leak in vLLM.
mistral.aiยท6hยท
Discuss: Hacker News
๐Ÿ“ŠMemory Profilers
Preview
Report Post
Investigating @sp1ritfyre: A Security Blue Team OSINT Challenge
medium.comยท2h
๐Ÿ”Security Types
Preview
Report Post
GNU C Language Manual
gnu.orgยท2h
๐Ÿช„C Metaprogramming
Preview
Report Post
Static Detection of Core Structures in Tigress Virtualization-Based Obfuscation Using an LLVM Pass
arxiv.orgยท17h
๐Ÿ—๏ธLLVM
Preview
Report Post
Using Secure Small Language Models to Navigate Big Data Sets
govtech.comยท3h
๐ŸŽฏFinite Automata
Preview
Report Post
Troubleshooting with fault tree analysis and PIOSEE
developers.redhat.comยท14h
๐ŸฉบCompiler Diagnostics
Preview
Report Post
Design Decision for Role-Based Access Control (RBAC)
cyberark.comยท7hยท
Discuss: DEV
๐Ÿ›ก๏ธCapability Security
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.comยท8h
๐Ÿ”Security Types
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.comยท9hยท
Discuss: Hacker News
๐Ÿ‘‘Dominator Analysis
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help