🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Secure Boot

UEFI Security, Chain of Trust, Hardware Attestation, Boot Integrity

Linux Jargon Buster: What are Secure Boot & Shim Files?
itsfoss.comΒ·6h
πŸ”’Hardware Attestation
Ubuntu Fundamentals: release
dev.toΒ·1dΒ·
Discuss: DEV
❄️Nix Adoption
How to (Almost) solve cybersecurity once and for all
adaptive.liveΒ·18hΒ·
Discuss: Hacker News
πŸ”Systems Hardening
How keys are used in FileVault and encryption
eclecticlight.coΒ·8hΒ·
Discuss: Lobsters
πŸ’£Compression Security
About to Take the Plunge - Any Final Words of Advice?
bargainhardware.co.ukΒ·50mΒ·
Discuss: r/homelab
πŸ”’Hardware Attestation
Running shadow system tests in RISC-V
ikerexxe.github.ioΒ·7h
πŸ‘‘RISC-V Privilege
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
What Are the Key Steps to Achieve PCI DSS 4.0 Compliance?
securityscorecard.comΒ·17h
πŸ”Capability Systems
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.comΒ·23h
πŸ›‘οΈeBPF Security
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·6h
πŸ”NTLM Forensics
ReBarUEFI: Resizable BAR for almost any UEFI system
github.comΒ·15hΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Post-Quantum Cryptography Implementation Enterprise-Readiness Analysis
darknet.org.ukΒ·13h
πŸ”Quantum Security
Microsoft makes Windows 10 ESU free for some users, but there is a catch
ghacks.netΒ·8h
πŸ”ŒOperating system internals
Update: Admin account built into IBM Storage Protect jeopardizes systems
heise.deΒ·1d
πŸ“¦Container Security
Program Execution, follow-up
windowsir.blogspot.comΒ·2hΒ·
Discuss: www.blogger.com
⚑Performance Tools
Watch the Geekom IT15 mini PC torture test: run over, hammered, and put in a washing machine
techspot.comΒ·4h
πŸ”’Hardware Attestation
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
How Not to Get Lost in PCI DSS Standards β€” A Tech Team’s Perspective
hackernoon.comΒ·8h
πŸ”—Data Provenance
How to automatically decrypt a LUKS LVM setup on boot with a USB
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”’Hardware Attestation
Design high-confidence computers using trusted instructional set architecture and emulators
arxiv.orgΒ·1d
πŸ§ͺHardware Fuzzing
Loading...Loading more...
AboutBlogChangelogRoadmap