🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Security
Tactical Trust (1 of 2): Platform Crypto for Developers
tiemoko.com·1d·
Discuss: Hacker News
💻Programming
Customer guidance for SharePoint vulnerability CVE-2025-53770
msrc.microsoft.com·1d·
Discuss: Hacker News
🖥️Self-Hosting
Cybersecurity agency issues warning about end-of-train device vulnerability
trains.com·2d·
Discuss: Hacker News
📐System Design
Managing EFI Boot Loaders for Linux: Controlling Secure Boot
rodsbooks.com·11h·
Discuss: Hacker News
🐧Linux
Show HN: An Intuitive Go Library for Handling Complex Permission/RBAC
github.com·14h·
Discuss: Hacker News
💻Programming
Face age and ID checks? Using the internet in Australia is about to fundamentally change
theguardian.com·9h·
Discuss: Hacker News
📐System Design
The “Working from China” Problem
magoo.medium.com·2d·
Discuss: Hacker News
📐System Design
MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles
usenix.org·21h·
Discuss: Hacker News
📐System Design
Using leaked data to examine vulnerabilities in SMS routing and SS7 signalling
medium.com·17h·
Discuss: Lobsters, Hacker News
🗃️Databases
Max severity Cisco ISE bug allows pre-auth command execution, patch now
bleepingcomputer.com·2d·
Discuss: Hacker News
📐System Design
Google finds custom backdoor being installed on SonicWall network devices
arstechnica.com·3d·
Discuss: Hacker News
🔍Reverse Engineering
Firefox Security & Privacy newsletter 2025 Q2
attackanddefense.dev·2d·
Discuss: Lobsters, Hacker News
🐧Linux
Singapore actively dealing with ongoing cyberattack on critical infrastructure: Shanmugam
channelnewsasia.com·1d·
Discuss: Hacker News
🔌Embedded
Microsoft Names Threat Actors
learn.microsoft.com·2d·
Discuss: Hacker News
💻Programming
AI Agents Outnumber Humans 17:1 in the New Identity Crisis Era
syntheticauth.ai·1d·
Discuss: Hacker News
🔍Reverse Engineering
My Ultimate Self-hosting Setup
codecaptured.com·1d·
Discuss: Lobsters, Hacker News, r/selfhosted
🖥️Self-Hosting
API Security in IAM: Architecture, Best Practices, and Threat Mitigation
guptadeepak.com·2d·
Discuss: Hacker News
⚙️System Programming
Streamline Global Client Communication with 20 Secure Accounts
news.ycombinator.com·3d·
Discuss: Hacker News
📐System Design
Code Execution Through Email: How I Used Claude to Hack Itself
pynt.io·3d·
Discuss: Hacker News
💻Programming
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more
techcrunch.com·18h·
Discuss: Hacker News
🔍Reverse Engineering
Loading...Loading more...
AboutBlogChangelogRoadmap