๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Capability Security

Object Capabilities, Principle of Least Authority, Secure Composition, Access Control

The 9 Best Power Strips and Surge Protectors to Keep Your Devices Safe
popularmechanics.comยท11h
๐Ÿ Home Automation
<p>Just for the record, I&rsquo;m not going to stop using em dashes just because LLMs use them too. But to proove my authenticity, I&rsquo;ll occasionally use &...
lmika.orgยท2h
๐Ÿ–‹Typography
Analyzing Sharepoint Exploits (CVE-2025-53770, CVE-2025-53771), (Wed, Jul 23rd)
isc.sans.eduยท2d
๐ŸŒWASI
Use Your Type System
dzombak.comยท1dยท
Discuss: Lobsters, Hacker News, r/programming
ฮปLambda Formalization
Iโ€™ve had it with Microsoft
disconnect.blogยท11hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธTerminal Renaissance
ICML Statement about subversive hidden LLM prompts
icml.ccยท2dยท
Discuss: Hacker News
โš–๏ธConstraint Logic
I tested Trust's ergonomic keyboard and mouse - I'm not sold on the design, but it actually did make working from home even more comfortable
techradar.comยท1d
โŒจ๏ธMechanical Keyboards
AI coding agents in CI/CD pipelines create new attack vectors
stepsecurity.ioยท2dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
On Notifications
cacm.acm.orgยท2d
๐Ÿ”ŒOffline-first Apps
Steam games abused to deliver malware once again
malwarebytes.comยท9h
๐Ÿš€Indie Hacking
Al could be hiding its thoughts: Tech giants warn of 'Chain of Thought'
economictimes.indiatimes.comยท2dยท
Discuss: Hacker News
โœจAlgebraic Effects
Best Back To School Tech Deals 2025: Best essential tech bargains for the new school year
tomshardware.comยท12h
๐Ÿ”ŒOperating system internals
Old paradigm spoiling new โ€“ MCP's Structured Output undermines the point of MCP
github.comยท38mยท
Discuss: Hacker News
๐Ÿ“Linear Logic
Microsoft says China-based hackers exploiting critical SharePoint vulnerabilities to deploy Warlock ransomware โ€” three China-affiliated threat actors seen takin...
tomshardware.comยท1d
๐Ÿ”“Hacking
A new type of dealmaking is unnerving startup employees. Here are the questions to ask to make sure you don't get left out.
businessinsider.comยท16h
๐Ÿš€Indie Hacking
Choosing Public Datasets for Private Machine Learning via Gradient Subspace Distance
arxiv.orgยท21h
๐Ÿง Machine Learning
Introducing SRA Verify โ€“ an AWS Security Reference Architecture assessment tool
aws.amazon.comยท3d
๐ŸŒณArchive Merkle Trees
Agentic AI Identity Management Approach
cloudsecurityalliance.orgยท4dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
One Tool to Rule JWTs โ€” Easy JWT Pentesting with JWTAuditor
infosecwriteups.comยท19h
๐ŸŽซKerberos Attacks
I built an open source wisprflow
github.comยท10hยท
Discuss: Hacker News
๐ŸŽ™๏ธWhisper
Loading...Loading more...
AboutBlogChangelogRoadmap