🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Changelog: build-time flake inputs and unauthenticated upgrades
determinate.systems·2d
❄️Nix Flakes
What The Intercept Is Reading
theintercept.com·2d
📡RSS Readers
Security Flaws in the WebMonetization Site
shkspr.mobi·3d·
Discuss: Hacker News, shkspr.mobi
📡Feed Security
7 Beginner Machine Learning Projects To Complete This Weekend
kdnuggets.com·1d
🧠Machine Learning
Microsoft announces new in-house AI models: MAI-Voice-1 and MAI-1-preview
microsoft.ai·23h·
Discuss: Hacker News, r/LocalLLaMA
🎙️Whisper
Explaining the Need for Strongly Happens Before in C++
nekrozqliphort.github.io·1d·
Discuss: Hacker News, r/cpp
✨Effect Handlers
Google Advances Its Layer-1 Blockchain
coindesk.com·19h·
Discuss: Hacker News
⏳Time Capsule Networks
GPT-5 Made SEO Irreplaceable
dejan.ai·2h·
Discuss: Hacker News
🌀Brotli Internals
Building Voice Agents on Cloudflare
blog.cloudflare.com·41m·
Discuss: Hacker News
🎙️Whisper
A neat idea, but I can see this leading to the Balkanization of the Internet
boston.conman.org·3d
🛡Cybersecurity
Naylib – A Raylib Nim Wrapper
github.com·2h·
Discuss: Hacker News
🔓Open Source Software
Blind Source Separation-Enabled Joint Communication and Sensing in IBFD MIMO Systems
arxiv.org·13h
⏱️SMPTE Timecode
Programming in 2030: will devs still code, or just babysit AI?
dev.to·2h·
Discuss: DEV
🔄Language Evolution
Block unsafe prompts targeting your LLM endpoints with Firewall for AI
blog.cloudflare.com·3d
🛡️CLI Security
How Windows 11 is breaking from its bedrock and moving away
theregister.com·7h
🔌Operating system internals
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·4d
🔐Quantum Security
Mitigating Distribution Shift in Stock Price Data via Return-Volatility Normalization for Accurate Prediction
arxiv.org·13h
🧠Machine Learning
How AI Retrieves Anatomical Structures Using Vector Databases
hackernoon.com·2d
🗂️Vector Search
5 Tokens to Invest In as the Fed Ends Program That Increased Bank Scrutiny of Crypto
hackernoon.com·1d
🔗Hash Chains
Enhanced Magneto-Inductive Hybridization via Optimized Eddy Current Modulation and Adaptive Thermal Management
dev.to·13h·
Discuss: DEV
🧲Cassette Physics
Loading...Loading more...
AboutBlogChangelogRoadmap