🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

Enhancing Microsoft 365 security by eliminating high-privilege access
microsoft.com·21h
🔐Capability Systems
Object Oriented Programming is an expensive disaster which must end
medium.com·8h·
Discuss: Hacker News
💻Programming languages
Introducing the Application Attack Matrix for Modern App Security | Oligo Security
oligo.security·4h
🔒WASM Capabilities
Stop Thinking “User Signup”. Start Thinking “New Tenant”
hackernoon.com·9h
🔐Capability Systems
Building Trust in the Digital Age
paloaltonetworks.com·7h
⚖️Legal Compliance
5 vital features reliable endpoint protection services need to have
techradar.com·7h
🛡️eBPF Security
AI Trust Score Ranks LLM Security
darkreading.com·18h
💻Local LLMs
How Does PGP Encryption Work—and Is It Still Secure in 2025?
securityscorecard.com·1d
🔐Quantum Security
Setting Up Your Own Certificate Authority for Development
isc.sans.edu·16m·
Discuss: Hacker News
🔐Certificate Analysis
Dubious security vulnerability: If I perform this complex series of manual steps, I can crash a program I am running
devblogs.microsoft.com·2d
🔓Hacking
Does Movable Antenna Present A Dual-edged Nature? From the Perspective of Physical Layer Security: A Joint Design of Fixed-position Antenna and Movable Antenna
arxiv.org·12h
🌊Stream Ciphers
Why LLM Authorization is Hard
osohq.com·16h·
Discuss: Hacker News
🔒Language-based security
Open-Source Security Paradox: More Code, More Validation
onekey.so·6h·
Discuss: Hacker News
🔓Open Source Software
Jobs for IT security experts: vocational training is becoming more attractive
heise.de·3h
🔐Capability Systems
Approach to mainframe penetration testing on z/OS. Deep dive into RACF
securelist.com·1d
🗄️Database Internals
eSIM security research (GSMA eUICC compromise and certificate theft)
seclists.org·8h
🏺Kerberos Archaeology
Maximizing Leverage in Software Systems
bencornia.com·2d
🌊Streaming Systems
How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
blog.checkpoint.com·1d
🕸️Mesh Networking
3 Crowdsourced Security Myths Are Holding You Back
hackerone.com·15m
🔓Hacking
The cloud-native imperative for effective cyber resilience
theregister.com·1d
💾Persistence Strategies
Loading...Loading more...
AboutBlogChangelogRoadmap