Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18002
posts in
514.0
ms
SIEM
Rules for detecting exploitation of vulnerabilities in
FortiCloud
SSO
kaspersky.com
·
3d
🧪
Protocol Fuzzing
The anti-Bayesian is standing at the back window with a shotgun, scanning for priors coming over the hill, while a million assumptions just walk right into his house through the front door. (also, an interesting point by
Yann
LeCun
about human language)
statmodeling.stat.columbia.edu
·
3d
🔲
Cellular Automata
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
3d
🎫
Kerberos Exploitation
The
Human-Centric
Stack: Why Logs Are the Great
Equalizer
in the Age of AI
loggly.com
·
3d
📝
Log Parsing
Sixteen
Claude AI agents working together created a new C
compiler
arstechnica.com
·
2d
·
Discuss:
r/programming
,
r/technews
🏗️
Compiler Archaeology
The AI
Visibility
Gap: a
Defining
Security Challenge for 2026
lmgsecurity.com
·
4d
🎯
Threat Hunting
Codified
Finite-state
Machines for Role-playing
arxiv.org
·
3d
🔄
Finite State Machines
Alignment
Verifiability
in Large Language Models: Normative
Indistinguishability
under Behavioral Evaluation
arxiv.org
·
3d
🔍
Z3 Parsing
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
3d
🔐
Quantum Security
How I Built My Project in
Haskell
dev.to
·
1d
·
Discuss:
DEV
🔗
Functional Compilers
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
1d
·
Discuss:
DEV
🚀
Indie Hacking
The Engagement Trap: 45
Adversarial
Patterns in Modern AI
Assistants
pastebin.com
·
3d
·
Discuss:
Hacker News
🎯
Threat Hunting
Beyond
agentic
coding
haskellforall.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
,
r/programming
⚡
Effectful Programming
Rethinking Time in
Computation
– From Wall
Clocks
to State Transitions
d1gesto.blogspot.com
·
2d
·
Discuss:
Hacker News
⏰
Time Crystals
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
📦
Container Security
akshat666/ephemeral-first-security-framework
: Security through
transience
, not just encryption
github.com
·
5d
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Building a battle tested C
compiler
in a new language using
Codex
moonbitlang.com
·
3d
·
Discuss:
Hacker News
🏗️
Compiler Archaeology
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
3d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🧪
Binary Fuzzing
Digging into
UUID
,
ULID
, and implementing my own
atlas9.dev
·
4d
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Let
Lambda
Come Over
yamlscript.org
·
2d
⬆️
Lambda Lifting
Loading...
Loading more...
« Page 5
•
Page 7 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help