🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“¦ Container Security

Docker Scanning, Kubernetes Security, Image Vulnerability, Runtime Protection

The MedusaLocker ransomware gang is hiring penetration testers
fortra.comΒ·4d
πŸ•΅οΈPenetration Testing
CobraJet Nvidia AI-powered drone killer takes out 'overwhelming enemy drone incursions' at up to 300mph
tomshardware.comΒ·14h
🎯Threat Hunting
Just a nice shell script
bitecode.devΒ·5dΒ·
Discuss: r/programming
🐚Bash FP
What’s in your wallet?
johndcook.comΒ·1d
🌳Archive Merkle Trees
Show HN: An open-source,security first,local-first memory tool for AI assistants
news.ycombinator.comΒ·4dΒ·
Discuss: Hacker News
🌐WASI
Trackable Flask API using EventSource
dev.toΒ·1dΒ·
Discuss: DEV
🌊Streaming Systems
Does the Skeleton-Recall Loss Really Work?
arxiv.orgΒ·1h
πŸŒ€Riemannian Computing
Open Questions about Time and Self-reference in Living Systems
arxiv.orgΒ·1h
πŸ”²Cellular Automata
Understanding Databases: A Comprehensive Guide to Types and Use Cases
dev.toΒ·2dΒ·
Discuss: DEV
πŸ—„οΈDatabase Internals
Sonar Surfaces Multiple Caveats When Relying on LLMs to Write Code
devops.comΒ·4d
πŸ“Code Metrics
A Knowledge Graph Informing Soil Carbon Modeling
arxiv.orgΒ·1h
πŸ“ŠGraph Databases
Privacy Enhancement for Gaze Data Using a Noise-Infused Autoencoder
arxiv.orgΒ·1h
πŸ›‘οΈDifferential Privacy
Grounding Rule-Based Argumentation Using Datalog
arxiv.orgΒ·1h
🧠Computational Logic
A multigrid method for CutFEM and its implementation on GPU
arxiv.orgΒ·1h
🌐Computational Topology
WeatherPaper
hackster.ioΒ·20h
βš™οΈDIY Electronics
AI-Driven Surrogate Modeling for Enhanced Thermal-Fluid-Structural Optimization of Multifunctional Heat Sinks
dev.toΒ·2dΒ·
Discuss: DEV
🌐Computational Topology
Automate AIOps with Amazon SageMaker Unified Studio projects, Part 1: Solution architecture
aws.amazon.comΒ·5d
🏠Homelab Orchestration
AI-Driven Single-Cell Transcriptomic Data Harmonization via Dynamic Hypervector Alignment
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Vector Dimensionality
Efficient Differentiable Hardware Rasterization for 3D Gaussian Splatting
arxiv.orgΒ·4d
🌊Streaming Algorithms
New NFC-Driven Android Trojan PhantomCard targets Brazilian bank customers
securityaffairs.comΒ·2d
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap