🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

The Artwork That Spawned 9/11 Conspiracy Theories and Mystery
rollingstone.com·9h
📼Cassette Culture
Major NPM Supply-Chain Attack: Potential Impact on Mobile Applications
nowsecure.com·2d
📦Package Managers
The subjective experience of coding in different programming languages
interconnected.org·22h·
Discuss: Hacker News
💻Programming languages
Many Hard Leetcode Problems are Easy Constraint Problems
buttondown.com·20h·
Discuss: Lobsters, Hacker News, Hacker News, r/programming
🧮Constraint Solvers
Yes, your Mac talks to itself. It’s okay.
sixcolors.com·2d·
Discuss: Hacker News
💾vintage computing
The risks of cognitive offloading [to AI]
siliconangle.com·1d·
Discuss: Hacker News
⚖️Emulation Ethics
Apple’s new Memory Integrity Enforcement system deals a huge blow to spyware developers
cyberscoop.com·20h
🏷️Memory Tagging
I don’t want AI agents controlling my laptop
sophiebits.com·2d·
Discuss: Lobsters, Hacker News
🔐Capability Systems
Zero-Click Remote Code Execution: Exploiting MCP and Agentic IDEs
lakera.ai·5d·
Discuss: Hacker News
🌳Archive Merkle Trees
color npm package compromised
fasterthanli.me·2d·
Discuss: Lobsters, Hacker News, r/javascript, r/programming
❄️Nix Flakes
Big Bang AI Festival: ‘Doing is like wanting, only more extreme’
heise.de·1h
⚖️Lossy Compression Ethics
Hack The Box — Synced (rsync)
infosecwriteups.com·2d
📦Content Addressable
SAP users patch now - worrying S/4HANA vulnerability being exploited in the wild
techradar.com·2d
🕵️Penetration Testing
The exceptionalism of software is unwarranted
overbring.com·2d·
Discuss: Hacker News
📏Code Metrics
5 Benefits of Using Penetration-Tested Translation Software
dev.to·1d·
Discuss: DEV
🕵️Penetration Testing
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.org·2d
🎫Kerberos Attacks
ICYMI: Exposure Management Academy on Attack Surface Management, Proactive Security and More
tenable.com·2d
🎯Threat Hunting
Certified Red Team Analyst — Exam Review
infosecwriteups.com·2d
🕵️Penetration Testing
DIY MCP Servers vs Verified Solutions: The Trade-offs Nobody's Talking About 🎭
dev.to·13h·
Discuss: DEV
🤝Distributed Consensus
ActiveState and RL: Unlocking Software Supply Chain Security
reversinglabs.com·18h
🔗Supply Chain
Loading...Loading more...
AboutBlogChangelogRoadmap