🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Mixed nuts #15
brycewray.com·1d
📰RSS Reading Practices
Ken Kocienda - Coding With AI using Cursor
kocienda.micro.blog·13h
🔄Language Evolution
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·2d
🔒Linear Types
How to Fix Your Context
dbreunig.com·1d·
Discuss: Hacker News
✨Effect Handlers
What Is CIFS and How Does It Impact Enterprise File System Security?
securityscorecard.com·2d
💿ZFS Internals
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.com·22h
⚙️WASM Runtime
How to Prevent AI Agents from Accessing Unauthorized Data - DevConf.CZ 2025
youtube.com·1d
🔄Archival Workflows
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.com·2d
🔓Hacking
This new malware has developed a spooky way to tell AI-based detection methods to ignore it
techradar.com·5h
🦠Malware Analysis
Machine Learning Fundamentals: adam optimizer tutorial
dev.to·3h·
Discuss: DEV
📊Feed Optimization
Edge Clique Partition and Cover Beyond Independence
arxiv.org·15h
🕸️Graph Algorithms
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
techradar.com·11h
🔓Hacking
Driving cost-efficiency and speed in claims data processing with Amazon Nova Micro and Amazon Nova Lite
aws.amazon.com·2d
🌊Stream Processing
APT42 impersonates cyber professionals to phish Israeli academics and journalists
securityaffairs.com·12h
🎫Kerberos Attacks
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·1d
📄Document Digitization
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.to·30m·
Discuss: DEV
🎫Kerberos Attacks
MMSearch-R1: Incentivizing LMMs to Search
arxiv.org·1d
🔍BitFunnel
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Small Encoders Can Rival Large Decoders in Detecting Groundedness
arxiv.org·15h
🧮Kolmogorov Complexity
I implemented database in Go - learned some hard lessons about transparency along the way
reddit.com·5h·
Discuss: r/golang
🗄️Database Internals
Loading...Loading more...
AboutBlogChangelogRoadmap