Feeds to Scour
SubscribedAll
Scoured 15628 posts in 1.30 s
Exploring Text Compression
denvaar.dev·16h
📝Text Compression
Preview
Report Post
What is API Security?
securityscorecard.com·1h
📦Container Security
Preview
Report Post
DoPE: Decoy Oriented Perturbation Encapsulation Human-Readable, AI-Hostile Documents for Academic Integrity
arxiv.org·14h
🔍Vector Forensics
Preview
Report Post
CodeSOD: Validation Trimmed Away
thedailywtf.com·12h
Format Validation
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·5h
🛡Cybersecurity
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·7h
📊Static Analysis
Preview
Report Post
Welcome 0x1eef (Robert) to the HardenedBSD Development Team!
hardenedbsd.org·2h
🐡OpenBSD
Preview
Report Post
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
securityaffairs.com·21h
🦠Malware Analysis
Preview
Report Post
Values of the world, unite!
jemarch.net·1d
🔧Binary Parsers
Preview
Report Post
SLSA: Safeguarding artifact integrity across any software supply chain
sam.roque-worcel.com·21h·
Discuss: Hacker News
🔗Supply Chain
Preview
Report Post
Redacting Faces, People, Vehicles, and Plates with Amped Replay Assisted Redaction
blog.ampedsoftware.com·4h
🧪Archive Fuzzing
Preview
Report Post
FEATURE - Building Frameworks for Long-Term Digital Preservation
infotoday.com·23h
🏛️OAIS Implementation
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·5h
🕵️Penetration Testing
Preview
Report Post
cwida/fsst: Fast Static Symbol Table (FSST): efficient random-access string compression
github.com·1d·
Discuss: Hacker News
⚙️Compression Benchmarking
Preview
Report Post
Defence in Depth in Python Security: Why Using Multiple SAST Tools Matters
nocomplexity.com·3h
🔒WASM Capabilities
Preview
Report Post
HackKey -First Ever Wireless Ethical Hacking Device WiFi/BLE
hackster.io·3h
📼Cassette Hacking
Preview
Report Post
InfoSec News Nuggets
aboutdfir.com·5h
🔓Hacking
Preview
Report Post
Block Devices in User Space
hackaday.com·16h
💿WORM Storage
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
·4h
🎯Threat Hunting
Preview
Report Post
The coming industrialisation of exploit generation with LLMs
dev.to·1d·
Discuss: DEV
💻Local LLMs
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help