🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ CBOR Security

Binary Serialization, Protocol Safety, Memory Safety, Parsing Vulnerabilities

Worth Reading 062425
rule11.tech·1d
🌐DNS over QUIC
The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb
tenable.com·20h
🏠Homelab Security
A case for courage, when speaking of AI danger
lesswrong.com·7h·
Discuss: Hacker News
🎯Threat Hunting
Internationalization-check: Validating your Next.js internationalization
lingual.dev·11h·
Discuss: Hacker News
✅Format Verification
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.dev·2d·
Discuss: Hacker News
🚀Indie Hacking
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.com·1d·
Discuss: Substack
🔓Hacking
How Language Became Infrastructure—and Why That Should Worry Us
hackernoon.com·1d
📋Document Grammar
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·2d
🔓Hacking
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·3d
🔢Bitwise Algorithms
The Power of Strong Linearizability: the Difficulty of Consistent Refereeing
arxiv.org·3d
🎯Performance Proofs
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·2d
🎫Kerberos Attacks
[$] Libxml2's "no security embargoes" policy
lwn.net·1d
🔓Free and open source
Rsync Vulnerabilities Open the Door to Remote Exploits
dev.to·4d·
Discuss: DEV
🔓Hacking
Memory Safety in Web Rust System Zero Cost Secure(1750671065382000)
dev.to·3d·
Discuss: DEV
🦀Rust Borrowing
Voxkryptia: A Conceptual Framework for Advanced Database Security
dev.to·1d·
Discuss: DEV
🧬PostgreSQL Forensics
Playwright: Using Cognito to Log In for Your E2E Tests
dev.to·20h·
Discuss: DEV
⚡Proof Automation
Show HN: 10x Kubernetes Cluster on Hetzner Cloud
github.com·59m·
Discuss: Hacker News
📦Container Security
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.to·3d·
Discuss: DEV
🔓Password Cracking
Critical Security Importance Digital Age Web Techniques(1750777701670000)
dev.to·2d·
Discuss: DEV
🔒WASM Capabilities
IP Sentry (Golang)
dev.to·2d·
Discuss: DEV
🛡️eBPF Security
Loading...Loading more...
AboutBlogChangelogRoadmap