๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

From Hotel Printers to Home Offices: Securing the Last Endpoint You Forgot
lmgsecurity.comยท2d
๐Ÿ“„Document Digitization
Why AI Alone Fails at Large-Scale Code Modernization
thenewstack.ioยท7h
๐Ÿ”„Language Evolution
Anthropic warns that its Claude AI is being 'weaponized' by hackers to write malicious code
techradar.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Putin on the code: DoD reportedly relies on utility written by Russian dev
theregister.comยท3dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
The inadequate guide to Rails security
honeybadger.ioยท3d
๐ŸŽฏNTLM Attacks
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.comยท3d
๐ŸŽซKerberos Exploitation
Grok's First Vibe-Coding Agent Has a High 'Dishonesty Rate'
pcmag.comยท1dยท
Discuss: r/programming
๐Ÿ’พPersistence Strategies
Battlefield 6 Dev Apologizes For Requiring Secure Boot To Power Anti-Cheat Tools
games.slashdot.orgยท23h
๐Ÿ”’Secure Boot
Securing the AI "Before Timesโ€
paloaltonetworks.comยท2d
๐ŸŽฏThreat Hunting
Meet Bugsy, Your AI Web Bug Hunter
dev.toยท21hยท
Discuss: DEV
๐ŸงชProtocol Fuzzing
Passwordstate users should patch this auth bypass vulnerability immediately, company says
techradar.comยท1d
๐Ÿ”“Password Cracking
Cybersecurity Snapshot: Agentic AI Security in Focus With Anthropicโ€™s Chilling Abuse Disclosure and CSAโ€™s New Identity Protection Framework
tenable.comยท1d
๐ŸŽฏThreat Hunting
The One Where We Just Steal the Vulnerabilities
labs.watchtowr.comยท3dยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
Towards OpenPGP v6 in PGPainless and Bouncy Castle
warmwasserwerfer.deยท12hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Tell HN: Crazy sloppiness in X.com Content Security Policy
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐ŸŒDNS Security
Can We Build Trustable Hardware? (2019)
bunniestudios.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
Add a privacy layer to your LLM app as AI companies' privacy policies evolve
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Uncovering the Weak Spots: A Guide to AI Security Vulnerabilities
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Wallet-Draining npm Package Impersonates Nodemailer to Hijack Crypto Transactions
socket.devยท1dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
WAF through the eyes of hackers (2019)
habr.comยท1dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap