Feeds to Scour
SubscribedAll
Scoured 15529 posts in 711.8 ms
Eliciting Harmful Capabilities by Fine-Tuning On Safeguarded Outputs
arxiv.org·1d
🔒WASM Capabilities
Preview
Report Post
What is API Security?
securityscorecard.com·16h
📦Container Security
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·2h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
A new era of agents, a new era of posture
microsoft.com·19h
🎯Threat Hunting
Preview
Report Post
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
lmgsecurity.com·5h
🔗Data Provenance
Preview
Report Post
Secure Boot, TPM and Anti-Cheat Engines
andrewmoore.ca·3h·
Discuss: Lobsters
🔒Hardware Attestation
Preview
Report Post
OWASP Mobile Application Security Explained: How to Put MASVS, MASTG and MASWE Into Practice
nowsecure.com·20h
🔒WASM Capabilities
Preview
Report Post
Cyber Is What We Make of It
buttondown.com·18h
🛡Cybersecurity
Preview
Report Post
CAP Theorem Explained: Beyond the "Pick Two" Myth
blog.ahmazin.dev·3h·
Discuss: Hacker News
🤝Consensus Algorithms
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·1d·
Discuss: Hacker News
🔗Supply Chain
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·21h
📊Static Analysis
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
·18h
🎯Threat Hunting
Preview
Report Post
Mandatory SBOMs: What CRA is — and why it matters
reversinglabs.com·1d
🔐CBOR
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·17h
🎯Threat Hunting
Preview
Report Post
Defence in Depth in Python Security: Why Using Multiple SAST Tools Matters
nocomplexity.com·18h
🔒WASM Capabilities
Preview
Report Post
What does data ownership really mean?
prepend.com·1d
🔗Data Provenance
Preview
Report Post
Defining the Complete Foundational Primitive Core of Multi-Agent AI Trust Infrastructure
dev.to·8h·
Discuss: DEV
🤝Consensus Networks
Preview
Report Post
Why inaccessible cybersecurity is a security risk: our path to accessibility
blog.detectify.com·1d
🛡Cybersecurity
Preview
Report Post
Is that allowed? Authentication and authorization in Model Context Protocol
stackoverflow.blog·18h·
Discuss: Hacker News
🔐CBOR
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·19h
🛡Cybersecurity
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help