๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

Coffee Break: Armed Madhouse โ€“ The Two Faces of Palantir
nakedcapitalism.comยท17h
๐Ÿ”Capability Systems
Google to Require Developer Verification for Android Sideloading
mjtsai.comยท16h
๐Ÿ›ก๏ธARM TrustZone
AI firm says its technology weaponised by hackers
bbc.comยท6d
๐Ÿ•ต๏ธVector Smuggling
Salesforce-Connected Third-Party Drift Application Incident Response
paloaltonetworks.comยท1d
๐ŸšจIncident Response
Ten Thousand Lifetimes with Roguelikes
ian.mccowan.spaceยท3dยท
Discuss: Hacker News
๐ŸบGaming Archaeology
Hackers are using fake Zoom or Microsoft Teams invites to spy on all your workplace activity
techradar.comยท1d
๐ŸŽซKerberos Attacks
LegalPwn: Tricking LLMs by burying badness in lawyerly fine print
theregister.comยท2dยท
Discuss: Hacker News
๐Ÿ’ปLocal LLMs
The Pull Request That Changed How I Think About Code
dev.toยท1dยท
Discuss: DEV
โš™๏ธBuild Archaeology
Is AI the end of software engineering or the next step in its evolution?
theverge.comยท2dยท
Discuss: Hacker News
๐Ÿ“Code Metrics
Inverting the Xorshift128 random number generator
littlemaninmyhead.wordpress.comยท2dยท
Discuss: Hacker News, r/programming
๐ŸŒŠStream Ciphers
Palo Alto Networks disclose a data breach linked to Salesloft Drift incident
securityaffairs.comยท22h
๐ŸŽซKerberos Attacks
DDoS is the neglected cybercrime that's getting bigger. Let's kill it off
theregister.comยท2dยท
Discuss: Hacker News, Hacker News
๐Ÿดโ€โ˜ ๏ธPiracy
The resilient retailerโ€™s guide to proactive cyber defense
techradar.comยท1d
๐Ÿ›กCybersecurity
Google says reports of massive Gmail data breach are โ€œentirely falseโ€
arstechnica.comยท17hยท
Discuss: Hacker News, r/privacy
๐ŸŒDNS Security
Enterprise Prompt Security: Injection Prevention Tools Compared
infosecwriteups.comยท1d
๐Ÿ›ก๏ธCLI Security
Google contradicts: No major Gmail security vulnerability
heise.deยท16h
๐ŸŒDNS Security
The Cookie Bomb: My First $10K in Bug Bounties
infosecwriteups.comยท2d
๐ŸŽซKerberos Exploitation
Hackers are also going back to school - major campaign hijacks Google Classroom to hit targets
techradar.comยท2d
๐Ÿ•ต๏ธPenetration Testing
Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
unit42.paloaltonetworks.comยท1h
๐Ÿ”’WASM Capabilities
Qnap: Update closes some high-risk gaps in QTS and QuTS hero
heise.deยท1d
๐Ÿ”HSM Integration
Loading...Loading more...
AboutBlogChangelogRoadmap