🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ RISC-V Security

Hardware Extensions, PMP, Secure Enclaves, Open Security

Here’s Who Needs Android’s New Advanced Security Protection (and Who Probably Doesn’t)
lifehacker.com·7h
🛡️ARM TrustZone
Donkey Kong Country 2 and Open Bus
jsgroth.dev·2d
🎮GameBoy Architecture
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·1d
🎯Threat Hunting
Shane Kennedy - Software Engineer
shaneikennedy.xyz·3d
🦀Rust Macros
How keys are used in FileVault and encryption
eclecticlight.co·3d·
Discuss: Lobsters, Hacker News
💣Compression Security
Analysis Paralysis!
aliexpress.us·17h·
Discuss: r/homelab
📐Linear Algebra
PDP-11 Replica: The PiDP-11
obsolescence.dev·2d·
Discuss: Hacker News
💾vintage computing
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.dev·3d·
Discuss: Hacker News
🎯NTLM Attacks
Rust Forge Conf 2025 Schedule Announced
newsletter.rustforgeconf.com·18h
🦀Rust Macros
esnet/iperf
github.com·1d
🛡️eBPF Security
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.com·2d·
Discuss: Substack
🦀Rust Macros
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.com·2d
🎯Threat Hunting
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1751072274118800)
dev.to·5h·
Discuss: DEV
🌐Network Protocols
Implementing Zero Trust Security Models in Modern IT Infrastructures
dev.to·1d·
Discuss: DEV
🌐Network Security
Single Core Hundred Thousand Concurrency(1750947668443300)
dev.to·1d·
Discuss: DEV
🌊Stream Processing
Password-Derived Signature Authentication
github.com·4d·
Discuss: Hacker News
🔒LDAP Security
Top-rated root vulnerabilities threaten Cisco Identity Services Engine
heise.de·1d
🔓Hacking
US Falling Behind China in Exploit Production
darkreading.com·17h
🛡Cybersecurity
Introducing Zenoscript
dev.to·9h·
Discuss: DEV
🎯Gradual Typing
Technical Architecture Guide: Authorization Strategies for Multi-Merchant E-commerce Platforms
dev.to·2d·
Discuss: DEV
🔒WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap