Feeds to Scour
SubscribedAll
Scoured 72675 posts in 1.60 s
MirrorGuard: Toward Secure Computer-Use Agents via Simulation-to-Real Reasoning Correction
arxiv.orgยท1d
๐Ÿ›ก๏ธAI Security
Preview
Report Post
datahaven-xyz/datahaven: An EVM compatible Substrate chain, powered by StorageHub and secured by EigenLayer
github.comยท6h
๐ŸŽš๏ธTiered Storage
Preview
Report Post
The Sidecar Siphon: Exploiting Identity Leaks in Service Mesh Architectures
instatunnel.myยท20hยท
Discuss: r/programming
๐ŸCilium
Preview
Report Post
Pavis: A Dumb Proxy for Boring Reloads
fabian4.siteยท16hยท
Discuss: Hacker News
๐Ÿ“žTauri IPC
Preview
Report Post
Prompt-Driven UI: Building Production-Ready Login Pages with AgnosticUI & AI
dev.toยท9hยท
Discuss: DEV
๐ŸงŠIced
Preview
Report Post
Digital hygiene
karpathy.bearblog.devยท10h
๐Ÿ”’Security
Preview
Report Post
RUSTSEC-2026-0004: triton-vm: Triton VM Soundness Vulnerability due to Improper Sampling of Randomness
rustsec.orgยท20h
๐Ÿ‘ปRust Phantom Data
Preview
Report Post
Secure Boot, TPM and Anti-Cheat Engines
andrewmoore.caยท1hยท
Discuss: Lobsters
๐Ÿ”Hardware Security
Preview
Report Post
What is API Security?
securityscorecard.comยท14h
๐Ÿ”’Security
Preview
Report Post
A1RunGuard 2.20.2026.120
majorgeeks.comยท16h
๐Ÿ›ก๏ธPacket Filtering
Preview
Report Post
Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations
thehackernews.comยท2h
๐Ÿ”SGX Enclaves
Preview
Report Post
Zoom fixed critical Node Multimedia Routers flaw
securityaffairs.comยท13h
๐Ÿ”ญCilium Hubble
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.eduยท1hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Preview
Report Post
Sumo Logic strengthens cloud data security and data pipeline visibility with new Snowflake and Databricks integrations
prnewswire.comยท18h
๐ŸŒYugabyteDB
Preview
Report Post
WebAssembly Based Portable and Secure Sensor Interface for Internet of Things
arxiv.orgยท3h
๐Ÿ”WASM WASI
Preview
Report Post
New security and AI detection features for Google Workspace for Education
blog.googleยท1d
๐Ÿฆ…Falco
Preview
Report Post
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
tenable.comยท1d
๐Ÿ”’Rustls
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.ioยท1d
๐Ÿ“ŠCriterion.rs
Preview
Report Post
LABScon25 Replay | How to Bug Hotel Rooms v2.0
sentinelone.comยท18h
๐Ÿ Home Automation
Preview
Report Post
Here's how to interact with Protocol Dataloggers in Arknights: Endfield and get access authorization for the balloon men
pcgamer.com
ยท7h
๐Ÿ”บDelta Lake
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help