🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ WASM Security

Sandbox Escape, Module Validation, Memory Safety, Browser Security

A Refreshing SQL Injection Discovery in Z-Push
xbow.com·1d·
Discuss: Hacker News
🔐Cryptographic Archaeology
Regolith - A JavaScript library immune to ReDoS attacks
github.com·19h
⚡Dependent Rust
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
unit42.paloaltonetworks.com·14h
🛡️RISC-V Security
Emacs: Open URLs or search the web, plus browse-url-handlers
sachachua.com·2h
🐧FOSS
Stealthy PHP Malware Uses ZIP Archive to Redirect WordPress Visitors
blog.sucuri.net·2h
🦠Malware Analysis
Full QuickJS Support for Nginx
blog.nginx.org·21h·
Discuss: Hacker News
⚡gRPC
WASM the Hard Way: Porting the Chicory Compiler to Android
blog.evacchi.dev·4h·
Discuss: Lobsters, Hacker News
🧩WASM Components
Croissant! Building a No-Framework Web App
dbushell.com·16h·
Discuss: Hacker News
📡RSS Automation
Taming LLMs: How to Get Structured Output Every Time (Even for Big Responses)
dev.to·6h·
Discuss: DEV
📝Concrete Syntax
This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs
hackaday.com·10h
🔓Hacking
Nearly a million browsers affected by more malicious browser extensions - here's what we know
techradar.com·1d
🛡️WASM Sandboxing
Fortinet closes security leaks in several products
heise.de·1d
🔓Hacking
Modeling CORS frameworks with CodeQL to find security vulnerabilities
github.blog·1d
✅Format Verification
Why XSS Persists in This Frameworks Era?
flatt.tech·2d·
Discuss: Hacker News
🛡️WASM Sandboxing
Flakes aren't real and cannot hurt you: a guide to using Nix flakes the non-flake way - jade's www site
jade.fyi·9h
❄️Nixpkgs
BSDCan 2025 Trip Report – Mark Johnston
freebsdfoundation.org·4h
🔌Operating system internals
Towards Exception Safety Code Generation with Intermediate Representation Agents Framework
arxiv.org·2d
⚔️Lean Tactics
KL-001-2025-007: Schneider Electric EcoStruxure IT Data Center Expert Unauthenticated Remote Code Execution
seclists.org·2d
🛡️eBPF Security
Mitigating Ransomware Attacks with Object Storage
blog.min.io·1d
💿WORM Storage
Understanding the NCSC’s New API Security Guidance
lab.wallarm.com·1d
📦Container Security
Loading...Loading more...
AboutBlogChangelogRoadmap