Feeds to Scour
SubscribedAll
Bridging the gaps between protocol specifications and practice
blog.apnic.net·2d
🌐NetworkProtocols
Preview
Report Post
Retrieval-Augmented Few-Shot Prompting Versus Fine-Tuning for Code Vulnerability Detection
arxiv.org·2d
🧪Binary Fuzzing
Preview
Report Post
New Prompt Injection Attack Vectors Through MCP Sampling
unit42.paloaltonetworks.com·1d
gRPC
Preview
Report Post
Anatomy of a Domain Risk Engine: Regex vs. LLMs
urlert.com·2h·
Discuss: Hacker News
🕵️Domain Enumeration
Preview
Report Post
Quick takes on the Dec 5 Cloudflare outage
surfingcomplexity.blog·8h
👁️Observatory Systems
Preview
Report Post
Inside Shanya, a packer-as-a-service fueling modern attacks
news.sophos.com·2h
🏺ZIP Archaeology
Preview
Report Post
Refactoring and minimal examples
markjgsmith.com·12h
🔗Concatenative Programming
Preview
Report Post
AI research agents would rather make up facts than say "I don't know"
the-decoder.com·14h
🤖AI Curation
Preview
Report Post
What is a Pedersen commitment?
johndcook.com·12h
🔐Quantum Security
Preview
Report Post
Metasploit Wrap-Up 12/05/2025
rapid7.com·1d
📦Container Security
Preview
Report Post
CVE-2023-20078: Triggering command injection in Cisco IP phones
ibm.com·23h·
Discuss: Hacker News
🧪CBOR Fuzzing
Preview
Report Post
Cloudflare Outage: Rust Analysis
splinter.com.au·1d·
Discuss: Hacker News
🦀Embedded Rust
Preview
Report Post
I built a "Paranoid" Data Protocol that runs away from server seizure or censorship (Python + Rust)
dev.to·11h·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
Cryptography for the Everyday Developer: Understanding RSA
sookocheff.com·1d
🔐Homomorphic Encryption
Preview
Report Post
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
seclists.org·1d
🛡️Security Headers
Preview
Report Post
Formalization of Erdős problems
xenaproject.wordpress.com·1d
🎯Performance Proofs
Preview
Report Post
Notes on Distributed Systems for Young Bloods (2013)
somethingsimilar.com·10h·
Discuss: Hacker News
🤝Distributed Consensus
Preview
Report Post
Crossing the Autonomy Threshold
paloaltonetworks.com·1d
🎯Threat Hunting
Preview
Report Post
This Week in Security: React, JSON Formatting, and the Return of Shai Hulud
hackaday.com·1d
🔓Hacking
Preview
Report Post
My Problem with Hacklore (WiFi)
thecontractor.io·7h·
Discuss: Hacker News
🔓Hacking
Preview
Report Post