🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

At least four suspicious devices found after police shooting
the-independent.com·1d
🚨Incident Response
AI Creates the Problems it Solves
dbreunig.com·4h
⚡Proof Automation
Doing a bit of stress work on a new HDD
dan.langille.org·1d
📝SQLite WAL
Cybersecurity: The Economic Benefits of GDPR
cnil.fr·9h·
Discuss: Hacker News
⚖️Legal Compliance
Research Is a Drug: The Hidden High of Knowing Too Much
opuslabs.substack.com·8h·
Discuss: Substack
🔬Academic Search
Ask HN: How do you "replay" a costly user mistake in your internal software?
news.ycombinator.com·2d·
Discuss: Hacker News
🛡️Error Boundaries
An InfoSec Architect's First Taste of Temporal
supasaf.com·3d·
Discuss: Hacker News
⏰Temporal Logic
SFrame-based stack unwinding for the kernel
lwn.net·8h·
Discuss: Hacker News
🔩Systems Programming
Google's AI video tool amplifies fears of an increase in misinformation
aljazeera.com·1d·
Discuss: Hacker News
📰Content Curation
Iran-linked hackers target US transportation, manufacturing firms
cybersecuritydive.com·2d
🛡Cybersecurity
Lovestruck US Air Force worker admits leaking secrets on dating app
theregister.com·22h
🕵️Vector Smuggling
AI Agent Smart Contract Exploit Generation
arxiv.org·2d
🧪Protocol Fuzzing
KL-001-2025-009: Schneider Electric EcoStruxure IT Data Center Expert Remote Command Execution
seclists.org·2d
🛡️eBPF Security
Malicious pull request infects VS Code extension
reversinglabs.com·3d
🚀Indie Hacking
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks
arxiv.org·2d
🧪Hardware Fuzzing
The Ultimate AI Coding Tools for Your 2025 Summer Projects
dev.to·9h·
Discuss: DEV
⚡Proof Automation
French cops cuff Russian pro basketball player on ransomware charges
theregister.com·16h
🛡Cybersecurity
Show HN: Authorization in LLM Applications
osohq.com·2d·
Discuss: Hacker News
💻Local LLMs
MCP Deep Dive: the Great, the Broken, and the Downright Dangerous
dev.to·2d·
Discuss: DEV
⚡gRPC
I built a vector-value database in pure C: libvictor + victordb (daemon) — AMA / Feedback welcome
github.com·7h·
Discuss: r/programming
🗂️Vector Databases
Loading...Loading more...
AboutBlogChangelogRoadmap