๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฃ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Mixed nuts #15
brycewray.comยท1d
๐Ÿ“ฐRSS Reading Practices
Protecting Science: TIB Builds Dark Archive for ArXiv
blog.tib.euยท1dยท
Discuss: Hacker News
๐Ÿ“šMARC Records
Ken Kocienda - Coding With AI using Cursor
kocienda.micro.blogยท1d
๐Ÿ”„Language Evolution
Call for blanket ban on open source contribution or publishing
news.ycombinator.comยท7hยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
What Is CIFS and How Does It Impact Enterprise File System Security?
securityscorecard.comยท3d
๐Ÿ’ฟZFS Internals
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.comยท1d
โš™๏ธWASM Runtime
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.toยท15hยท
Discuss: DEV
๐ŸŽซKerberos Attacks
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols๏ผˆ1750952117902400๏ผ‰
dev.toยท1dยท
Discuss: DEV
๐ŸŒNetwork Protocols
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.orgยท2d
๐Ÿ“ƒManuscript Tokenization
Kafka Fundamentals: kafka retention.ms
dev.toยท2dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
CBF-AFA: Chunk-Based Multi-SSL Fusion for Automatic Fluency Assessment
arxiv.orgยท2d
๐ŸŽ™๏ธWhisper
Think Your Business is Secure? Hereโ€™s Why You Might Be Wrong
infosecwriteups.comยท1d
๐ŸŽฏThreat Hunting
Inside the vLLM Inference Server: From Prompt to Response
thenewstack.ioยท20h
๐Ÿ’ปLocal LLMs
Top-rated root vulnerabilities threaten Cisco Identity Services Engine
heise.deยท2d
๐Ÿ”“Hacking
Introducing Zenoscript
dev.toยท12hยท
Discuss: DEV
๐ŸŽฏGradual Typing
Microsoft rolls out Windows changes to prevent another CrowdStrike meltdown
zdnet.comยท1dยท
Discuss: Hacker News
๐Ÿ”ŒOperating system internals
Free Hugo Autotranslator for Github Pages
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Migration Tools
MCP Security Vulnerabilities and Attack Vectors
dev.toยท17hยท
Discuss: DEV
๐Ÿ”CBOR
Structured Logging in NextJS with OpenTelemetry
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Log Parsing
The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb
tenable.comยท1d
๐Ÿ Homelab Security
Loading...Loading more...
AboutBlogChangelogRoadmap