Feeds to Scour
SubscribedAll
Scoured 15863 posts in 129.6 ms
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Deep Dive into VCP v1.1
dev.to·1d·
Discuss: DEV
🔗Hash Chains
Preview
Report Post
Lessons from Formally Verified Deployed Software Systems (Extended version)
arxiv.org·15h
⚖️Verification Calculi
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·22h·
Discuss: Hacker News
🔗Supply Chain
Preview
Report Post
Forward to the Past: The Y2K38 Problem Ahead
bitsight.com·37m
Archive Fixity
Preview
Report Post
Tenable Discovers SSRF Vulnerability in Java TLS Handshakes That Creates DoS Risk
tenable.com·1d
🌐NetworkProtocols
Preview
Report Post
A Scientific Data Integrity system based on Blockchain
arxiv.org·15h
🔗Blockchain Archives
Preview
Report Post
Architecting Cloud-Native Ambient Agents: Patterns for Scale and Control
next.redhat.com·6h
🏠Homelab Orchestration
Preview
Report Post
Values of the world, unite!
jemarch.net·1d
🔧Binary Parsers
Preview
Report Post
BPF Verifier State Pruning: Timeline
pchaigno.github.io·1d
🛡️Archive Verification
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
·5h
🎯Threat Hunting
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·8h
📊Static Analysis
Preview
Report Post
CodeSOD: Well Timed Double Checking
thedailywtf.com·1d
🧪Binary Fuzzing
Preview
Report Post
The Problem with Lying Is Keeping Track of All the Lies
materialize.com·1d·
Discuss: Hacker News
🛡️Archive Verification
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.com·14h·
Discuss: Hacker News
🔐PKI Archaeology
Preview
Report Post
What Is Data Leakage
securityscorecard.com·3h
🕳️Information Leakage
Preview
Report Post
Commit Boost
blog.lambdaclass.com·5h
🔐CBOR
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·6h
🕵️Penetration Testing
Preview
Report Post
Canonicalize Your Web Identity and Achieve Data Sovereignty with PESOS
shellsharks.com·3h
🏠Personal Archives
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·6h
🛡Cybersecurity
Preview
Report Post
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
securityaffairs.com·23h
🦠Malware Analysis
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help