Feeds to Scour
SubscribedAll
Scoured 16026 posts in 137.6 ms
From runtime risk to real‑time defense: Securing AI agents
microsoft.com·1d
🔐Capability Systems
Preview
Report Post
From WAL to WASM - High-Performance Local-First Sync with Postgres & SQLite
bdovenbird.com·6h·
Discuss: DEV
📝Database WAL
Preview
Report Post
Towards a Goal-Centric Assessment of Requirements Engineering Methods for Privacy by Design
arxiv.org·19h
🔐Capability Systems
Preview
Report Post
A Protocol for Package Management
nesbitt.io·2d·
📦Package Managers
Preview
Report Post
Making the Most of Your Docker Hardened Images Enterprise Trial - Part 2
docker.com·4h
📦Container Security
Preview
Report Post
Exploring common centralized and decentralized approaches to secrets management
aws.amazon.com·1d
🌳Archive Merkle Trees
Preview
Report Post
The Wasm Breach: Escaping Backend WebAssembly Sandboxes
instatunnel.my·5d·
🛡️WASM Sandboxing
Preview
Report Post
A JSON schema package for Go
opensource.googleblog.com·20h·
Discuss: Blogger
📋Protocol Buffers
Preview
Report Post
OWASP Top 10 2025 – What is new and what has actually changed
blog.knowit.eu·1d
🔐Capability Systems
Preview
Report Post
Port of Context: The open source code mode
thenewstack.io·5h
🤖Network Automation
Preview
Report Post
Mastering Python Network Programming: From Raw Sockets to Protocol Implementation
dev.to·9h·
Discuss: DEV
🌐NetworkProtocols
Preview
Report Post
Securing Agents in Production (Agentic Runtime, #1)
blog.palantir.com·2d·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
Wiz – AI-Powered Pentest Assistant (Open Source)
github.com·1d·
Discuss: Hacker News
Proof Automation
Preview
Report Post
OWASP Mobile Application Security Explained: How to Put MASVS, MASTG and MASWE Into Practice
nowsecure.com·3d
🛡️WASM Sandboxing
Preview
Report Post
"Integrity by Design" through Ensuring "Illegal States are Unrepresentable" - Part 1
javajanitorjim.substack.com·3h·
Discuss: Substack
Format Verification
Preview
Report Post
U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
securityaffairs.com·14h
🔓Hacking
Preview
Report Post
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025
synacktiv.com·1d
💾Memory Mapping
Preview
Report Post
120 Domain-Specific Languages for Security
arxiv.org·1d
🔤DSLs
Preview
Report Post
What If We Took Message-Passing Seriously?
worksonmymachine.ai·7h·
Discuss: Hacker News
🌐Protocol Synthesis
Preview
Report Post
A Verification Framework For Trojan Detection (U. of Kansas, U. of Florida)
semiengineering.com·23h
🔍RISC-V Forensics
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help