๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

When Kernel Comments Get Weird: The Tale of `drivers/char/mem.c`
elisa.techยท2d
๐Ÿ”eBPF
Many Hard Leetcode Problems are Easy Constraint Problems
buttondown.comยท7hยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸงฎConstraint Solvers
Flagged by the Algorithm: Klarna Thought I'm a Fraudster
algorithmwatch.orgยท20hยท
Discuss: Hacker News
โš–๏ธLegal Compliance
Escaping the Internet
ryanckulp.comยท2dยท
Discuss: Hacker News
๐Ÿ Personal Archives
'Microsoft Was Freaking Out': An Oral History of the L0pht
decipher.scยท6dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Defending Against NPM Supply Chain Attacks - NPM Vulnerability Scanner
blog.verichains.ioยท1d
๐Ÿ“ฆPackage Managers
AI Apocalypse? Why language surrounding tech is sounding increasingly religious
thenationalherald.comยท3hยท
Discuss: Hacker News
๐Ÿค–AI Curation
I donโ€™t want AI agents controlling my laptop
sophiebits.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ”Capability Systems
Ransomware 2025: Infostealers on the March
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Report: China's Geedge Networks supplies censorship systems to countries
heise.deยท9h
๐Ÿง…Tor Networks
Bad actors exploit X's Grok to run 'racy' malvertising campaign
scworld.comยท5dยท
Discuss: Hacker News
๐Ÿ“กFeed Security
US Indicts LockerGoga, MegaCortex, Nefilim Ransomware Admin
decipher.scยท19h
๐ŸŽซKerberos Exploitation
Zero-Click Remote Code Execution: Exploiting MCP and Agentic IDEs
lakera.aiยท4dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
color npm package compromised
fasterthanli.meยท2dยท
Discuss: Lobsters, Hacker News, r/javascript, r/programming
โ„๏ธNix Flakes
SAP users patch now - worrying S/4HANA vulnerability being exploited in the wild
techradar.comยท2d
๐Ÿ•ต๏ธPenetration Testing
Scaffolding for production vibe coding
interjectedfuture.comยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Hack The Box โ€” Synced (rsync)
infosecwriteups.comยท2d
๐Ÿ“ฆContent Addressable
The exceptionalism of software is unwarranted
overbring.comยท1dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
5 Benefits of Using Penetration-Tested Translation Software
dev.toยท1dยท
Discuss: DEV
๐Ÿ•ต๏ธPenetration Testing
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.orgยท2d
๐ŸŽซKerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap