๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Language-based security

information-flow

Async BOFs โ€“ โ€œWake Me Up, Before You Go Goโ€
outflank.nlยท1d
๐Ÿ”eBPF
Demystifying the SQLcl MCP Server
hartenfeller.devยท1d
๐Ÿ“žSession Types
OCI, Oh My: Remote Code Execution on Oracle Cloud Shell and Code Editor Integrated Services
tenable.comยท1d
๐Ÿ”CBOR
Salt Typhoon 'extensively' compromised a state national guard network for months
metacurity.comยท1d
๐Ÿ›กCybersecurity
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
securityaffairs.comยท19h
๐Ÿฆ Malware Analysis
Azure's Inferno: Escape from API Hell
wallpunch.netยท14hยท
Discuss: Hacker News, r/programming
๐Ÿ”—Hypermedia APIs
Exploring User Security and Privacy Attitudes and Concerns Toward the Use of General-Purpose LLM Chatbots for Mental Health
arxiv.orgยท1d
๐Ÿ’ปLocal LLMs
GORM Magic: Go Database Made Easy โšก
dev.toยท5hยท
Discuss: DEV
โ›๏ธSQL Archaeology
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.toยท15hยท
Discuss: DEV
๐ŸŒDistributed Hash
Bridging the Gap in Vision Language Models in Identifying Unsafe Concepts Across Modalities
arxiv.orgยท1d
๐Ÿ’พBinary Linguistics
๐Ÿ›๏ธ Using Blockchain to Anchor AI: Why Future AI Systems Require Consensus and Censorship Resistance
dev.toยท13hยท
Discuss: DEV
๐ŸคDistributed Consensus
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgยท1d
๐ŸŒDNS Security
Heterogeneous Dynamic Logic: Provability Modulo Program Theories
arxiv.orgยท3d
๐Ÿง Computational Logic
Building Production-Grade Network Telemetry: A gRPC Journey Into the Heart of Network Monitoring
dev.toยท1dยท
Discuss: DEV
๐Ÿ“กNetwork Monitoring
My favorite use-case for AI is writing logs
newsletter.vickiboykis.comยท4hยท
Discuss: Lobsters, Hacker News
๐ŸŒณIncremental Parsing
I built a CLI to catch prompt injection & LLM jailbreaks. Want to try it out?
dev.toยท9hยท
Discuss: DEV
โšกProof Automation
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท1d
๐ŸบKerberos Archaeology
Show HN: ProjectD โ€“ Google Drive-based, AES-encrypted C2 in C/C++
github.comยท2dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents
arxiv.orgยท2d
๐ŸŽตAudio ML
LiLM-RDB-SFC: Lightweight Language Model with Relational Database-Guided DRL for Optimized SFC Provisioning
arxiv.orgยท1d
๐ŸŒ€Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap