🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.com·5h·
Discuss: Hacker News
🕳LLM Vulnerabilities
If you can generate obfuscated chain-of-thought, can you monitor it?
lesswrong.com·8h
🛡️AI Security
Hackers are using link wrapping to steal your Microsoft 365 login
nordot.app·10h
🕳LLM Vulnerabilities
v0: vibe coding, securely
vercel.com·11h
🛡️AI Security
Microsoft and Windows Have Many Back Doors, But LLM Slop Keep Claiming That Linux Has "Backdoor"
techrights.org·5h
🕳LLM Vulnerabilities
97% of Companies Breached Permit Employees' Unauthorized AI Access
thelowdownblog.com·11h·
Discuss: www.thelowdownblog.com
🛡️AI Security
How to Create Unbreakable Job Security: A Software Developer's Guide to Making Yourself Indispensable
getparthenon.com·17h·
Discuss: Hacker News, r/programming
💾Persistence Strategies
Mobile app analytics library led to the PII exposure
cossacklabs.com·8h·
Discuss: Hacker News
🔍Binary Analysis
Didn’t Take Long To Reveal The UK’s Online Safety Act Is Exactly The Privacy-Crushing Failure Everyone Warned About
techdirt.com·2h
🛡️Content Moderation
Drawafish.com Postmortem: Whoops
aldenhallak.com·12h·
Discuss: Hacker News, r/programming
🚀Indie Hacking
🎲 Enter the Matrix
blog.webb.page·3h
📄File Formats
Credix exploited for $4.5 million, reaches deal with thief
web3isgoinggreat.com·5h
🚀Indie Hacking
The browser is the next security frontier: how do we secure it?
techzine.eu·13h
🔐Hardware Security
Codemakers race to secure the internet as quantum threat looms
techxplore.com·12h
🌐Distributed systems
Red-teaming a RAG app: What happens?
blog.pamelafox.org·7h·
Discuss: www.blogger.com, Hacker News
🕳LLM Vulnerabilities
I Found 12 People Who Ditched Their Expensive Software for AI-built Tools
kill-the-newsletter.com·8h
🪄Prompt Engineering
Why a hacker-turned-CEO believes quantum tech could break Bitcoin
nordot.app·8h
🔐Hardware Security
Powering AI-Driven Security with the Open Cybersecurity Schema Framework
aws.amazon.com·2h
🛡️AI Security
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.io·5h
🖥GPUs
Our vision for the future of identity security? It's already in motion
oleria.com·10h·
Discuss: Hacker News
💾Persistence Strategies
Loading...Loading more...
AboutBlogChangelogRoadmap