🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Securing and governing the rise of autonomous agents​​
microsoft.comΒ·3h
πŸ”Capability Systems
Reimagining Web3 Interactions: How Gaia Powers Smart Token Creation on Linea with MetaMask Delegation Toolkit
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”’WASM Capabilities
Are MDM solutions the right choice for your business?
proton.meΒ·2h
πŸ”HSM Integration
Architecting Beliefs for a Contested World
vasily.ccΒ·1dΒ·
Discuss: Hacker News
βš™οΈsystems theory
Fragmented SSE Is a Risk You Can’t Afford
blogs.cisco.comΒ·7h
πŸ”Capability Systems
Introducing Cloudflare Application Confidence Score For AI Applications
blog.cloudflare.comΒ·5h
πŸ‘οΈObservatory Systems
Job Posting: Systems and Security Administrator
citizenlab.caΒ·4h
🏠Homelab Security
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netΒ·3h
πŸ“‘Network Monitoring
U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comΒ·10h
🎫Kerberos Exploitation
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comΒ·3h
πŸ‘οΈSystem Observability
The EU’s Cyber Resilience Act: Redefining Secure Software Development
devops.comΒ·5h
πŸ”“Open Source Software
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netΒ·5h
πŸ¦€Rust Macros
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comΒ·1d
πŸ›‘Cybersecurity
Code does not lie
nocomplexity.comΒ·1d
πŸ”’Language-based security
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comΒ·7h
βœ…Format Verification
Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.comΒ·13h
πŸ”Capability Systems
LibreOffice Stakes Claim as Strategic Sovereignty Tool For Governments
news.slashdot.orgΒ·3h
πŸ”“Open Source Software
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comΒ·1d
πŸ”Quantum Security
Builder Pattern in CDK
medium.comΒ·23hΒ·
Discuss: Hacker News
🧱Immutable Infrastructure
Loading...Loading more...
AboutBlogChangelogRoadmap