🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

Worth Reading 090925
rule11.tech·1d
🧅Tor Networks
Major NPM Supply-Chain Attack: Potential Impact on Mobile Applications
nowsecure.com·2d
📦Package Managers
The subjective experience of coding in different programming languages
interconnected.org·18h·
Discuss: Hacker News
💻Programming languages
Many Hard Leetcode Problems are Easy Constraint Problems
buttondown.com·16h·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🧮Constraint Solvers
Yes, your Mac talks to itself. It’s okay.
sixcolors.com·2d·
Discuss: Hacker News
💾vintage computing
The risks of cognitive offloading [to AI]
siliconangle.com·1d·
Discuss: Hacker News
⚖️Emulation Ethics
Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers
cyberscoop.com·16h
🏷️Memory Tagging
I don’t want AI agents controlling my laptop
sophiebits.com·2d·
Discuss: Lobsters, Hacker News
🔐Capability Systems
The Quiet Revolution in Kubernetes Security
darkreading.com·15h
📦Container Security
Ransomware 2025: Infostealers on the March
reversinglabs.com·1d
🦠Malware Analysis
Report: China's Geedge Networks supplies censorship systems to countries
heise.de·18h
🧅Tor Networks
Pre-approved GLP-1 prescription scam could be bad for your health
malwarebytes.com·17h
💣ZIP Vulnerabilities
Rethinking Monitoring for AI-Based Technical Support Systems
hackernoon.com·15h
👁️System Observability
Zero-Click Remote Code Execution: Exploiting MCP and Agentic IDEs
lakera.ai·5d·
Discuss: Hacker News
🌳Archive Merkle Trees
Bad actors exploit X's Grok to run 'racy' malvertising campaign
scworld.com·5d·
Discuss: Hacker News
📡Feed Security
Hack The Box — Synced (rsync)
infosecwriteups.com·2d
📦Content Addressable
color npm package compromised
fasterthanli.me·2d·
Discuss: Lobsters, Hacker News, r/javascript, r/programming
❄️Nix Flakes
SAP users patch now - worrying S/4HANA vulnerability being exploited in the wild
techradar.com·2d
🕵️Penetration Testing
The exceptionalism of software is unwarranted
overbring.com·1d·
Discuss: Hacker News
📏Code Metrics
5 Benefits of Using Penetration-Tested Translation Software
dev.to·1d·
Discuss: DEV
🕵️Penetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap