🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ ARM TrustZone

Secure World, Trusted Execution Environment, Hardware Security, Mobile Security

5 Signs You’re Ready for a Career in Cybersecurity
offsec.com·6h
🛡Cybersecurity
A Meditation on iPhone, Time, & FOMO
om.co·6h
💾vintage computing
Chinese espionage campaign targeted House staffers ahead of trade talks
metacurity.com·1d
🔓Hacking
RomM 4.2 Launches with Console Mode and Smarter Library Tools
gardinerbryant.com·6h·
Discuss: Hacker News
🕹️Retro Gaming
Rust's Enterprise Breakthrough Year
rust-trends.com·13h·
Discuss: Hacker News
🦀Embedded Rust
UNAUTHORIZED WINDOWS/386
virtuallyfun.com·2d·
Discuss: Lobsters, Hacker News, Hacker News
🕸️WASM Archives
Fixing my gripes with GitHub using Gleam and a Raspberry Pi
giacomocavalieri.me·1d·
Discuss: Lobsters, Hacker News
🌀Brotli Internals
Boffins Build Automated Android Bug Hunting System
it.slashdot.org·3d
🚀Indie Hacking
Beyond package management: How Nix refactored my digital life
jimmyff.co.uk·1d·
Discuss: Hacker News, r/programming
❄️Nix Flakes
getumbrel/umbrel-apps
github.com·4d
🔌Interface Evolution
Eat Your Vegetables Before AI Dessert
writings.alethia.news·7h·
Discuss: Hacker News
⚙️Proof Engineering
O Brother, What Art Thou?
hackaday.com·1h
🕹️Retro Gaming
You too can run malware from NPM (I mean without consequences)
github.com·11h·
Discuss: Hacker News
🛡️WASM Security
Let's Make It Easy M-C-Peasy
dev.to·3h·
Discuss: DEV
🌐Protocol Synthesis
FFmpeg 7.0+ LADSPA Filter Arbitrary Shared Object Loading via Unsanitized Environment Variables
seclists.org·22h
🎬ffmpeg
Automated Dynamic Resource Allocation via Reinforcement Learning in Serverless Cloud Environments
dev.to·19h·
Discuss: DEV
🌊Stream Processing
Beyond Code: How to Use AI to Modernize Software Architecture
dev.to·19h·
Discuss: DEV
🔌Interface Evolution
Otters 🦦 - A minimal vector search library with powerful metadata filtering
reddit.com·19h·
Discuss: r/rust
🦀Rust Macros
Flatline TryHackMe Walkthrough — Complete Step-by-Step Guide to Root
infosecwriteups.com·2d
🎯NTLM Attacks
From Cloud through AI, a personal opinion of industry trends
dev.to·1d·
Discuss: DEV
🖥️Self-hosted Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap