๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Language-based security

information-flow

Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท8h
๐Ÿฆ€Rust Macros
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท18h
๐ŸŒณArchive Merkle Trees
Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
blog.cloudflare.comยท7hยท
Discuss: Hacker News
๐ŸŒDNS Security
Researchers warn of security flaws in AI-powered browsers
techspot.comยท3h
๐Ÿ”“Hacking
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท9h
โœ…Format Verification
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท6h
๐Ÿ‘๏ธSystem Observability
Securing and governing the rise of autonomous agentsโ€‹โ€‹
microsoft.comยท6h
๐Ÿ”Capability Systems
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท9h
๐Ÿ’ฃZIP Vulnerabilities
Barking Up The Ratchet Tree โ€“ MLS Is Neither Royal Nor Nude
soatok.blogยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”‘Cryptographic Protocols
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reยท1d
๐ŸคPaxos Consensus
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comยท7h
๐Ÿ•ต๏ธDomain Enumeration
Guessing Game: Haskell Style
entropicthoughts.comยท1d
๐Ÿ‘‘Dependent Haskell
Code does not lie
nocomplexity.comยท1d
๐Ÿ“Code Metrics
Reimagining Web3 Interactions: How Gaia Powers Smart Token Creation on Linea with MetaMask Delegation Toolkit
dev.toยท8hยท
Discuss: DEV
๐Ÿ”’WASM Capabilities
Das Problem mit German Strings
polarsignals.comยท1hยท
Discuss: Lobsters, Hacker News
โœ…Format Verification
InfoSec News Nuggets 8/26/2025
aboutdfir.comยท7h
๐Ÿ”“Hacking
The first AI-powered ransomware has been discovered โ€” "PromptLock" uses local AI to foil heuristic detection and evade API tracking
tomshardware.comยท2h
๐Ÿš€Indie Hacking
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netยท6h
๐Ÿ“กNetwork Monitoring
Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.comยท16h
๐Ÿ”Capability Systems
Go module for brute force attacks on SSH steals the accesses found
heise.deยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Loading...Loading more...
AboutBlogChangelogRoadmap