🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Language-based security

information-flow

From LLMs to MLLMs to Agents: A Survey of Emerging Paradigms in Jailbreak Attacks and Defenses within LLM Ecosystem
arxiv.org·1d
💻Local LLMs
Can All Knowledge Be Mined? A Formal Framework for φ^∞ Consequence Closure
researchgate.net·15h·
Discuss: Hacker News
🔢Denotational Semantics
Security Evolution: From Pothole Repair to Road Building
darkreading.com·18h
🔐Capability Security
Investigating HTTP Basic Auth Attack from a PCAP: A SOC Analyst’s Walkthrough
infosecwriteups.com·1d
🕵️Network Forensics
Simplifying Decryption With Cisco’s Secure Firewall 7.7
blogs.cisco.com·20h
🌳Archive Merkle Trees
Confidential Inference via Trusted Virtual Machines
anthropic.com·2h·
Discuss: Hacker News
🔒Privacy Preserving
OWASP Top for Business Logic Abuse
owasp.org·17h·
Discuss: Hacker News
🔒WASM Capabilities
graven-image: Portability library for CL image in REPL
github.com·13h·
Discuss: Lobsters
🦀Rust Macros
The Critical Importance of Security in the Digital Age(1750325263895400)
dev.to·22h·
Discuss: DEV
🔒WASM Capabilities
Five Uncomfortable Truths About LLMs in Production
lab.wallarm.com·23h
⚡Proof Automation
Structured Output for Beginners and 3 Prompting Tips
pocketflow.substack.com·7h·
Discuss: Substack
🌳Incremental Parsing
SAML vs. SSO
adaptive.live·28m·
Discuss: Hacker News
🔐Capability Systems
International Security Applications of Flexible Hardware-Enabled Guarantees
arxiv.org·1d
🌊Stream Ciphers
A deep-dive explainer on Ink and Switch's BeeKEM protocol
meri.garden·2d·
Discuss: Lobsters, Hacker News, Hacker News
🌳Archive Merkle Trees
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
huntress.com·6h·
Discuss: Lobsters, Hacker News
🔓Password Cracking
Akamai Web Application Firewall – How It Works
axonshield.com·11h·
Discuss: Hacker News
🕵️Network Forensics
CipherMind: The Longest Codebook in the World
arxiv.org·1d
💻Local LLMs
Angular Security: How Pipes Leak Your Data
medium.com·16h·
Discuss: Hacker News
🛡️WASM Sandboxing
Accelerate threat modeling with generative AI
aws.amazon.com·1d
🎯Threat Hunting
The Kill Switch: A Coder's Act of Revenge
hackernoon.com·18h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap