๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Language-based security

information-flow

Async BOFs โ€“ โ€œWake Me Up, Before You Go Goโ€
outflank.nlยท16h
๐Ÿ”eBPF
Welcoming Aura to Have I Been Pwned's Partner Program
troyhunt.comยท7h
๐Ÿ›กCybersecurity
OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
tenable.comยท15h
๐Ÿ”CBOR
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท1d
๐ŸบZIP Archaeology
Legal Ransomware
aardvark.co.nzยท11h
๐Ÿดโ€โ˜ ๏ธPiracy
Salt Typhoon 'extensively' compromised a state national guard network for months
metacurity.comยท14h
๐Ÿ›กCybersecurity
AI Shield: How Artificial Intelligence Protects Your Digital Life
blog.checkpoint.comยท2d
๐ŸŽฏThreat Hunting
An LLM Router That Thinks Like an Engineer
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ“กBGP Archaeology
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgยท1d
๐Ÿ”—Hash Chains
The Great Sludge: Why the Internet Will Die Before You Do
dev.toยท2hยท
Discuss: DEV
๐Ÿ“ฐRSS Archaeology
Kiro and the future of AI spec-driven software development
kiro.devยท14hยท
Discuss: Lobsters, Hacker News
๐Ÿ”ŒInterface Evolution
The FIPS 140-3 Go Cryptographic Module
go.devยท2dยท
Discuss: Lobsters, Hacker News, r/golang, r/programming
๐ŸŒŠStream Ciphers
Prompt Injection in LLM-Driven Systems
blog.gopenai.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
17 Translation Solution Security Features to Look for
dev.toยท22hยท
Discuss: DEV
โœ…Checksum Validation
Beyond Single Models: Enhancing LLM Detection of Ambiguity in Requests through Debate
arxiv.orgยท16m
๐Ÿ“ABNF Parsing
One Identity Everywhere: Why Digital Identity Is the Missing Infrastructure Layer in Tech
hackernoon.comยท6h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
AtCoder Finals Problem Statement
atcoder.jpยท10hยท
Discuss: Hacker News
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgยท16m
๐Ÿ•ต๏ธVector Smuggling
My wild ride from building a proxy server in rust to a data plane for AI โ€” and landing a $250K Fortune 500 customer.
reddit.comยท21hยท
Discuss: r/rust
๐Ÿ”ŒInterface Evolution
Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
arxiv.orgยท2d
๐ŸคSecure Multiparty
Loading...Loading more...
AboutBlogChangelogRoadmap