Feeds to Scour
SubscribedAll
Scoured 15867 posts in 1.86 s
VulnResolver: A Hybrid Agent Framework for LLM-Based Automated Vulnerability Issue Resolution
arxiv.org·15h
🐛Fuzzing
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.com·14h·
Discuss: Hacker News
🔐PKI Archaeology
Preview
Report Post
A new era of agents, a new era of posture
microsoft.com·6h
🎯Threat Hunting
Preview
Report Post
Architecting Cloud-Native Ambient Agents: Patterns for Scale and Control
next.redhat.com·6h
🏠Homelab Orchestration
Preview
Report Post
Why inaccessible cybersecurity is a security risk: our path to accessibility
blog.detectify.com·1d
🛡Cybersecurity
Preview
Report Post
OWASP Mobile Application Security Explained: How to Put MASVS, MASTG and MASWE Into Practice
nowsecure.com·7h
🔒WASM Capabilities
Preview
Report Post
Automating Privacy Code Reviews by Mapping How Software Handles Personal Data
hackernoon.com·11h
🔐Privacy Codecs
Preview
Report Post
Measuring Data Maturity
prepend.com·17h
🔗Data Provenance
Preview
Report Post
Simplex, a workflow specification language for autonomous agents
github.com·23h·
Discuss: Hacker News
⚙️TLA+
Preview
Report Post
LLMs in the SOC (Part 1) | Why Benchmarks Fail Security Operations Teams
sentinelone.com·1d
🎯Performance Forensics
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·22h·
Discuss: Hacker News
🔗Supply Chain
Preview
Report Post
AI Sovereignty in Europe: A Decision Framework
julsimon.medium.com·1d
🖥️Self-hosted Infrastructure
Preview
Report Post
Mandatory SBOMs: What CRA is — and why it matters
reversinglabs.com·1d
🔐CBOR
Preview
Report Post
The Levels of Agentic Coding
timkellogg.me·1d
Incremental Computation
Preview
Report Post
Conversation: LLMs and the what/how loop
martinfowler.com·5h
🧩WASM Components
Preview
Report Post
What is API Security?
securityscorecard.com·3h
📦Container Security
Preview
Report Post
The Three Phases of Data Pipelines
dev.to·1d·
Discuss: DEV
🌊Stream Processing
Preview
Report Post
Cyber Is What We Make of It
buttondown.com·5h
🛡Cybersecurity
Preview
Report Post
Lab: Distributing Level-2 IS-IS Routes into Level-1 Areas
blog.ipspace.net·13h
🧩WASM Components
Preview
Report Post
Defence in Depth in Python Security: Why Using Multiple SAST Tools Matters
nocomplexity.com·4h
🔒WASM Capabilities
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help