🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

When Kernel Comments Get Weird: The Tale of `drivers/char/mem.c`
elisa.tech·2d
🔍eBPF
Flagged by the Algorithm: Klarna Thought I'm a Fraudster
algorithmwatch.org·23h·
Discuss: Hacker News
⚖️Legal Compliance
Many Hard Leetcode Problems are Easy Constraint Problems
buttondown.com·10h·
Discuss: Lobsters, Hacker News, r/programming
🧮Constraint Solvers
'Microsoft Was Freaking Out': An Oral History of the L0pht
decipher.sc·6d·
Discuss: Hacker News
🚀Indie Hacking
Defending Against NPM Supply Chain Attacks - NPM Vulnerability Scanner
blog.verichains.io·1d
📦Package Managers
Escaping the Internet
ryanckulp.com·2d·
Discuss: Hacker News
🏠Personal Archives
AI Apocalypse? Why language surrounding tech is sounding increasingly religious
thenationalherald.com·6h·
Discuss: Hacker News
🤖AI Curation
The risks of cognitive offloading [to AI]
siliconangle.com·1d·
Discuss: Hacker News
⚖️Emulation Ethics
I don’t want AI agents controlling my laptop
sophiebits.com·1d·
Discuss: Lobsters, Hacker News
🔐Capability Systems
Report: China's Geedge Networks supplies censorship systems to countries
heise.de·12h
🧅Tor Networks
Bad actors exploit X's Grok to run 'racy' malvertising campaign
scworld.com·5d·
Discuss: Hacker News
📡Feed Security
Rethinking Monitoring for AI-Based Technical Support Systems
hackernoon.com·9h
👁️System Observability
US Indicts LockerGoga, MegaCortex, Nefilim Ransomware Admin
decipher.sc·22h
🎫Kerberos Exploitation
Zero-Click Remote Code Execution: Exploiting MCP and Agentic IDEs
lakera.ai·4d·
Discuss: Hacker News
🌳Archive Merkle Trees
color npm package compromised
fasterthanli.me·2d·
Discuss: Lobsters, Hacker News, r/javascript, r/programming
❄️Nix Flakes
Hack The Box — Synced (rsync)
infosecwriteups.com·2d
📦Content Addressable
5 Benefits of Using Penetration-Tested Translation Software
dev.to·1d·
Discuss: DEV
🕵️Penetration Testing
SAP users patch now - worrying S/4HANA vulnerability being exploited in the wild
techradar.com·2d
🕵️Penetration Testing
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.org·2d
🎫Kerberos Attacks
The exceptionalism of software is unwarranted
overbring.com·1d·
Discuss: Hacker News
📏Code Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap