🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ WASM Sandboxing

Isolation Mechanisms, Browser Security, Module Validation, Runtime Safety

Comparing Rust, JavaScript and Go for Authoring WASM Components
obeli.sk·9h·
Discuss: Hacker News
🧩WASM Modules
Unleashing AI/ML Inference: The Power of WebAssembly and WASI at the Edge
dev.to·1d·
Discuss: DEV
🌐WASI
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·5h
🦠Malware Analysis
[$] Libxml2's "no security embargoes" policy
lwn.net·2h
🔓Free and open source
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.com·11h
📝Concrete Syntax
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.io·23h
💻Local LLMs
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
What Is a Web Application Firewall and Do You Need One?
securityscorecard.com·22h
🌊Stream Processing
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.com·11h
📋Protocol Buffers
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.dev·1d·
Discuss: Hacker News
🎯NTLM Attacks
Web Numbers
ar.al·3h·
Discuss: Hacker News
📡DNS Archaeology
Black-Box Test Code Fault Localization Driven by Large Language Models and Execution Estimation
arxiv.org·14h
🔍Concolic Testing
Building Passwordless Authentication with Stytch
encore.dev·18h
🌐NetworkProtocols
bytecodealliance/wasm-micro-runtime
github.com·4d
⚙️WASM Runtime
C compiler for Web Assembly (c4wa)
github.com·1d·
Discuss: Hacker News
🌐WASI
Program Execution, follow-up
windowsir.blogspot.com·5h·
Discuss: www.blogger.com
⚡Performance Tools
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·1d·
Discuss: Hacker News
🎯NTLM Attacks
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·15h·
Discuss: DEV
🔒WASM Capabilities
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·9h
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap