๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Language-based security

information-flow

Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท5h
๐Ÿฆ€Rust Macros
ZAPS: A Zero-Knowledge Proof Protocol for Secure UAV Authentication with Flight Path Privacy
arxiv.orgยท14h
๐ŸŒณArchive Merkle Trees
Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
blog.cloudflare.comยท4hยท
Discuss: Hacker News
๐ŸŒDNS Security
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท2h
๐Ÿ‘๏ธSystem Observability
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท6h
โœ…Format Verification
Securing and governing the rise of autonomous agentsโ€‹โ€‹
microsoft.comยท2h
๐Ÿ”Capability Systems
Researchers warn of security flaws in AI-powered browsers
techspot.comยท21m
๐Ÿ”“Hacking
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท5h
๐Ÿ’ฃZIP Vulnerabilities
Barking Up The Ratchet Tree โ€“ MLS Is Neither Royal Nor Nude
soatok.blogยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”‘Cryptographic Protocols
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reยท1d
๐ŸคPaxos Consensus
Guessing Game: Haskell Style
entropicthoughts.comยท20h
๐Ÿ‘‘Dependent Haskell
Win-DDoS Under the Microscope: Lab Insights into Potential Threat Behavior
corero.comยท4h
๐Ÿ•ต๏ธDomain Enumeration
Code does not lie
nocomplexity.comยท1d
๐Ÿ“Code Metrics
Understanding OAuth Web Server Flow: A Beer Garden Analogy
stevetecharc.comยท12h
๐Ÿ”Capability Systems
Reimagining Web3 Interactions: How Gaia Powers Smart Token Creation on Linea with MetaMask Delegation Toolkit
dev.toยท5hยท
Discuss: DEV
๐Ÿ”’WASM Capabilities
InfoSec News Nuggets 8/26/2025
aboutdfir.comยท4h
๐Ÿ”“Hacking
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netยท3h
๐Ÿ“กNetwork Monitoring
Go module for brute force attacks on SSH steals the accesses found
heise.deยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Make and SQL: An old new way for Data Science workloads
vasvir.wordpress.comยท54mยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
AI in cybersecurity operations
jwgoerlich.comยท1d
๐Ÿ›กCybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap