๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ฃ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

The Vostochny gold mine โ€“ kinda traditional; but these days โ€“ completely digital.
eugene.kaspersky.comยท18h
๐ŸบKerberos Archaeology
Gunnar Wolf: The comedy of computation, or, how I learned to stop worrying and love obsolescence
gwolf.orgยท1d
๐ŸงฒMagnetic Philosophy
SRE Weekly Issue #491
sreweekly.comยท2d
๐Ÿ‘๏ธSystem Observability
Box CEO Aaron Levie tells BI the fix for AI's 'context rot' isn't one super-agent
businessinsider.comยท21m
โœ…Archive Fixity
Billions of Gmail users advised to change passwords
the-independent.comยท14h
๐Ÿ”“Hacking
Microsoft Entrusts DocumentDB to Linux Foundation
linuxiac.comยท18h
๐Ÿ“ฆMETS Containers
Whatโ€™s Next for Kotlin Multiplatform and Compose Multiplatform โ€“ August 2025 Update
blog.jetbrains.comยท1dยท
Discuss: Hacker News
๐ŸŒ€Brotli Dictionary
RubyGems Security Response to Socket.dev and How We Protect the Ruby Ecosystem
blog.rubygems.orgยท1dยท
Discuss: Hacker News, r/programming
โ„๏ธNix Flakes
86Box 5.0
86box.netยท2dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWASM Archives
5 Core I/O Models Every Software Engineer Should Know
alexpham.devยท2dยท
Discuss: r/programming
๐Ÿ”ฉSystems Programming
FTC to Big Tech: Don’t Trade American Privacy for Foreign Demands
circleid.comยท12h
๐Ÿ”คEBCDIC Privacy
Data I/O reports business disruptions in wake of ransomware attack
cyberscoop.comยท1d
๐ŸšจIncident Response
Grok: Thousands LOC a day in C is a big deal even if the "coder" uses LLM?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Ensuring Idempotency in Distributed Systems โ€“ Lessons from Go & GCP
dev.toยท1dยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
AWS Weekly Roundup: Amazon Aurora 10th anniversary, Amazon EC2 R8 instances, Amazon Bedrock and more (August 25, 2025)
aws.amazon.comยท1d
๐ŸŒŠStreaming Systems
M^3-GloDets: Multi-Region and Multi-Scale Analysis of Fine-Grained Diseased Glomerular Detection
arxiv.orgยท1d
๐Ÿ•ณ๏ธPersistent Homology
Preliminary Study on Space Utilization and Emergent Behaviors of Group vs. Single Pedestrians in Real-World Trajectories
arxiv.orgยท55m
๐Ÿ”ฒCellular Automata
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.comยท1d
๐Ÿ‘๏ธObservatory Systems
Sneaking Invisible Instructions by Developers in Windsurf
embracethered.comยท3d
๐Ÿ›ก๏ธWASM Sandboxing
Open source providers: BSI sows uncertainty in politics and business
heise.deยท10h
๐Ÿ”“Open Source Software
Loading...Loading more...
AboutBlogChangelogRoadmap