🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ“ Log Parsing

Event Analysis, Pattern Recognition, Structured Logging, SIEM Integration

[$] Libxml2's "no security embargoes" policy
lwn.netΒ·3h
πŸ”“Free and open source
Cactus Language β€’ Syntax 12
inquiryintoinquiry.comΒ·3h
πŸ“Concrete Syntax
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·5h
πŸ•΅οΈPenetration Testing
What Is an AI SOC Agent? What You Need to Know About the Most Strategic Operational Imperative in Cybersecurity Today
intezer.comΒ·49m
🎯Threat Hunting
Deep Dive into Databend UDF, implementing your data solutions with Python, WASM
databend.comΒ·5hΒ·
Discuss: Hacker News
πŸ“‹DFDL
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comΒ·3h
πŸ‘οΈSystem Observability
Show HN: Logcat.ai – AI-powered observability for Operating Systems | Free Beta
logcat.aiΒ·1dΒ·
Discuss: Hacker News
πŸ”eBPF
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiΒ·1dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
NaviAgent: Bilevel Planning on Tool Dependency Graphs for Function Calling
arxiv.orgΒ·15h
πŸ”—Topological Sorting
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·13h
πŸ“Concrete Syntax
The complexity trap: why cybersecurity must be simplified
techradar.comΒ·10h
πŸ›‘Cybersecurity
Kumo Surfaces Structured Data Patterns Generative AI Misses
thenewstack.ioΒ·5h
πŸ“ŠGraph Databases
Contextualizing SUTRA: Advancements in Multilingual & Efficient LLMs
hackernoon.comΒ·3h
πŸ’»Local LLMs
Why Your Logs Are Talking β€” You Just Don’t Listen: The Untapped Power of Developer Observability
dev.toΒ·7hΒ·
Discuss: DEV
πŸ‘οΈSystem Observability
Machine Learning Fundamentals: active learning
dev.toΒ·1dΒ·
Discuss: DEV
πŸ€–Grammar Induction
Machine Learning Fundamentals: active learning with python
dev.toΒ·2hΒ·
Discuss: DEV
🧠Machine Learning
Why Dyad?: A Perspective for Modelica Users
juliahub.comΒ·4hΒ·
Discuss: Hacker News
πŸ’§Liquid Types
Machine Learning Fundamentals: accuracy project
dev.toΒ·2dΒ·
Discuss: DEV
βœ…Archive Validation
Behavioral Anomaly Detection in Distributed Systems via Federated Contrastive Learning
arxiv.orgΒ·15h
πŸ‘οΈObservatory Systems
Loading...Loading more...
AboutBlogChangelogRoadmap