🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Cybersecurity
Integrity violation: toxic workplaces in infosec (WHY2025)
cdn.media.ccc.deΒ·1d
πŸ”’Privacy
Hashing and Salting Passwords in C#
dev.toΒ·11hΒ·
Discuss: DEV
πŸ”’Privacy
Cyber Incident Response Needs Dynamic Command Structure Instead of Static Guidelines
blogger.comΒ·23h
πŸ‡―Japan
Website asks me to choose the name of someone I’ve β€œrecently been in contact with” as a security question when trying to change my password, and it lists someon...
reddit.comΒ·9hΒ·
Discuss: r/privacy
πŸ”’Privacy
Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.comΒ·1d
πŸ“ΊAnime
Don't stop at basic protections; make ongoing training a priority
techradar.comΒ·8h
πŸ”’Privacy
From medieval stronghold to cyber fortress: Shielding Europe's digital future
techxplore.comΒ·57m
πŸ¦€Rust
What is Fil-c and how to use it?
gizvault.comΒ·10hΒ·
Discuss: r/C_Programming
πŸ¦€Rust
We Scanned 68,000 WordPress Sites: Only 15.3% Pass Basic Security (Are You One of Them?)
serveravatar.comΒ·10hΒ·
Discuss: DEV
πŸ”’Privacy
A Beginner’s Guide to Building a Cyber Security Plan for Small Businesses
dev.toΒ·21hΒ·
Discuss: DEV
πŸ”’Privacy
RediGuard: AI-Powered Real-Time Security Monitoring with Redis 8
youtu.beΒ·23hΒ·
Discuss: DEV
πŸ¦€Rust
Let Me Preface That…
systemsapproach.orgΒ·8h
πŸ”’Privacy
Cybersecurity Learning Journey: Reposting with Clarity
dev.toΒ·2dΒ·
Discuss: DEV
πŸ”’Privacy
SED: Open source semantic layer and AI-data firewall for safe, governed database access
reddit.comΒ·22hΒ·
Discuss: r/opensource
πŸ”’Privacy
SLIP: Soft Label Mechanism and Key-Extraction-Guided CoT-based Defense Against Instruction Backdoor in APIs
arxiv.orgΒ·12h
πŸ”’Privacy
New Malware Campaign Using Legitimate-Looking Software Targets Users Worldwide
blogger.comΒ·1d
πŸ”’Privacy
The Invisible War: How AI Is Already Rewriting the Rules of Cyber Conflict
hackernoon.comΒ·13h
πŸ¦€Rust
Challenge the Cyber (WHY2025)
cdn.media.ccc.deΒ·16h
πŸ”’Privacy
Building a Layered Security System to Prevent Cyber Attacks in Corporate Environments
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”’Privacy
From Linux Primitives to Kubernetes Security Contexts
learnkube.comΒ·2h
πŸ¦€Rust
Loading...Loading more...
AboutBlogChangelogRoadmap