🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

Pre-Auth SQLi to RCE – Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.com·1d·
Discuss: Hacker News
🔐CBOR
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·7h
🧮Z3 Solver
Parsing Safetensors File Format in C
leetarxiv.substack.com·20h·
Discuss: Substack, r/programming
✅Format Verification
MCP: A Practical Security Blueprint for Developers
thenewstack.io·15h
🔓Hacking
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
thezdi.com·21h
🦀Rust Verification
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.org·2d
🌐DNS Security
Functional Abstract Interpretation
simon.peytonjones.org·1d·
Discuss: Hacker News
🔗Functional Compilers
You Are in a Box
jyn.dev·1d·
Discuss: Lobsters, Hacker News
🐚Shell Calculus
U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·11h
🔓Hacking
Hackers exploit a blind spot by hiding malware inside DNS records
arstechnica.com·26m
🌐DNS Security
All About Server Side Template Injection (SSTI)
infosecwriteups.com·1h
🛡️WASM Security
🔐 Introducing EMCL – A Secure Protocol for AI Agents to Call Tools
dev.to·20h·
Discuss: DEV
🌐NetworkProtocols
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.space·14h
🔢Bitwise Algorithms
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com·11h·
Discuss: Lobsters, Hacker News
🛡️eBPF Security
Show HN: From Zod schema to agent-ready MCP server – minimal, typed, deployable
github.com·21h·
Discuss: Hacker News
🔐CBOR
A distributed systems reliability glossary
antithesis.com·20h·
Discuss: Lobsters, Hacker News, r/programming
✅Archive Fixity
Defeating Memory Leaks With Zig Allocators
tgmatos.github.io·20h·
Discuss: Hacker News, r/programming
🔒Type Safety
APIs Are Eating the Internet—And Hackers Are Eating APIs
hackernoon.com·6h
🔓Hacking
Advanced JIT Compilers for Ruby: TruffleRuby and JRuby
blog.appsignal.com·2h·
Discuss: Hacker News
💧Liquid Types
A Programmer’s Guide to x86-64 Assembly (Series Overview)
blog.codingconfessions.com·6h
🔧RISC-V Assembler
Loading...Loading more...
AboutBlogChangelogRoadmap