🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“¦ Container Security

Docker Scanning, Kubernetes Security, Image Vulnerability, Runtime Protection

Playbook for Building Secure Cloud or Kubernetes Applications
medium.comΒ·1dΒ·
Discuss: Hacker News
πŸ–₯️Self-hosted Infrastructure
Looking for Recommendations & Feedback on Monitoring/Observability (kube-prometheus-stack + Promtail deprecation)
reddit.comΒ·12hΒ·
Discuss: r/kubernetes
πŸ‘οΈObservatory Systems
Homelab Kubernetes Automation: Why I Chose K3s
blog.leechpepin.comΒ·1dΒ·
Discuss: r/homelab, r/selfhosted
🏠HomeLab
Hackers 'Shellter' Various Stealers in Red Team Tool to Evade Detection
darkreading.comΒ·12h
πŸš€Indie Hacking
ufrisk/MemProcFS
github.comΒ·1h
πŸ› οΈGreaseweazle
Keep secrets and configmaps syncronized across clusters and namespaces
github.comΒ·1hΒ·
Discuss: Hacker News
🀝Consensus Protocols
From Dev to Deploy: Compose as the Spine of the Application Lifecycle
docker.comΒ·1d
πŸ”ŒInterface Evolution
Read /proc/net/tcp If ss, nc, netstat, telnet and curl Aren't Installed
nickjanetakis.comΒ·1d
🌐Network Protocols
Exploiting Partial Compliance: The Redact-and-Recover Jailbreak
generalanalysis.comΒ·6hΒ·
Discuss: Hacker News
πŸ§ͺCBOR Fuzzing
Are Open Ports Putting Your Network at Risk?
securityscorecard.comΒ·11h
🌐BGP Security
Advanced Strategies to Deploy Phoenix Applications with Kamal
blog.appsignal.comΒ·16hΒ·
Discuss: Hacker News
🏠Homelab Orchestration
CitrixBleed 2 exploitation started mid-June β€” how to spot it
doublepulsar.comΒ·12h
🎫Kerberos Exploitation
Scanning for Post-Quantum Cryptographic Support
anvilsecure.comΒ·10hΒ·
Discuss: Hacker News
πŸ”Certificate Analysis
Be careful where you click in Google search results - it could be damaging malware
techradar.comΒ·8h
🏺Kerberos Archaeology
Persistent Exploitation of ASP.NET Components Fuels Remote Code Execution Attacks
research.kudelskisecurity.comΒ·1d
🌐WASI
KDE Plasma 6.4 Released for OpenBSD
discoverbsd.comΒ·1d
πŸ”ŒOperating system internals
How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
blog.checkpoint.comΒ·14h
πŸ•ΈοΈMesh Networking
Which Kubernetes is the Smallest? Examining Talos Linux, K3s, K0s, and More
siderolabs.comΒ·11hΒ·
Discuss: Lobsters, Hacker News
πŸ”ŒOperating system internals
Learn Linux before Kubernetes
medium.comΒ·18h
πŸ“¦METS Containers
RVISmith: Fuzzing Compilers for RVV Intrinsics
arxiv.orgΒ·23h
πŸ›Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap