🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·12h
📋Protocol Buffers
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·7h
🦠Malware Analysis
A New Era of Code Quality: Beyond bugs to supply chain security and dependency health
dev.to·1h·
Discuss: DEV
🔒WASM Capabilities
Building a Language Server
bullno1.com·2d·
Discuss: Hacker News, r/programming
🗣️Domain-Specific Languages
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nl·14h
🌊Stream Ciphers
Semantic-Aware Parsing for Security Logs
arxiv.org·1d
📝Log Parsing
WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
tomshardware.com·5h
💣ZIP Vulnerabilities
XOR Marks the Flaw in SAP GUI
darkreading.com·6h
🔓Hacking
New rust mocking library Injectorpp 0.4.0 is released! Type check is added and more
reddit.com·1d·
Discuss: r/rust
🦀Rust Verification
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·11h
🦠Malware Analysis
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·1d
🔐Quantum Security
[$] Libxml2's "no security embargoes" policy
lwn.net·4h
🔓Free and open source
Program Execution, follow-up
windowsir.blogspot.com·7h·
Discuss: www.blogger.com
⚡Performance Tools
How to (Almost) solve cybersecurity once and for all
adaptive.live·23h·
Discuss: Hacker News
🔐Systems Hardening
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·52m
🎯Threat Hunting
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.io·1d
💻Local LLMs
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·10h
🎫Kerberos Attacks
SAVANT: Vulnerability Detection in Application Dependencies through Semantic-Guided Reachability Analysis
arxiv.org·1d
💧Liquid Types
Loading...Loading more...
AboutBlogChangelogRoadmap