๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฃ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Checking Out CPython 3.14's remote debugging protocol
rtpg.coยท1d
๐Ÿ‘๏ธSystem Observability
How Security and Privacy Teams Break Barriers Together
zeltser.comยท1d
๐Ÿ•ณ๏ธInformation Leakage
Most ints are not floats
johndcook.comยท1dยท
Discuss: Hacker News
๐Ÿ“Interval Arithmetic
A brief introduction to MCP server performance optimization
catchmetrics.ioยท21hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
FBI, cybersecurity firms say a prolific hacking crew is now targeting airlines and the transportation sector
techcrunch.comยท20h
๐Ÿ”“Hacking
Redefining Zero Trust in the Age of AI Agents and Agentic Workflows
blogs.cisco.comยท2d
๐Ÿ”’Language-based security
Save your disk, write files directly into RAM with /dev/shm
hiandrewquinn.github.ioยท3dยท
Discuss: Hacker News
๐Ÿ› ๏ธGreaseweazle
A language, IDE, and serverless runtime for spreadsheet-style logic
parabola.ioยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
๐Ÿ›ก๏ธ AWS WAF + ALB: New Resource-Level DDoS Protection is Here! ๐Ÿš€
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธeBPF Security
[$] Libxml2's "no security embargoes" policy
lwn.netยท3d
๐Ÿ”“Free and open source
Azure Fundamentals: Microsoft.VMwareCloudSimple
dev.toยท2dยท
Discuss: DEV
๐Ÿ Homelab Orchestration
An OCC Idea
lambdacreate.comยท3d
๐Ÿ—„๏ธDatabase Internals
Machine Learning Fundamentals: adam optimizer tutorial
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
Democratized cybercrime: a new lower bar for hackers and higher stakes for security
techradar.comยท2d
๐Ÿ”“Hacking
Driving cost-efficiency and speed in claims data processing with Amazon Nova Micro and Amazon Nova Lite
aws.amazon.comยท3d
๐ŸŒŠStream Processing
How AI Helped Me Build a CRM Integration 60% Faster: A Real Vue.js + CouchDB Case Study
dev.toยท2dยท
Discuss: DEV
๐ŸŒ€Brotli Internals
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.toยท1dยท
Discuss: DEV
๐ŸŽซKerberos Attacks
MMSearch-R1: Incentivizing LMMs to Search
arxiv.orgยท3d
๐Ÿ”BitFunnel
'CitrixBleed 2' Shows Signs of Active Exploitation
darkreading.comยท1d
๐Ÿ“ฆContainer Security
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.comยท3d
๐ŸŽซKerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap