🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ WebAssembly Security

Sandboxing, Capability Systems, Memory Safety, Browser Isolation

I Supercharged My Browser GPT with Rust and WebAssembly: The Journey to a Dual-Engine AI
dev.to·1d·
Discuss: DEV
🦀Rust Macros
Popular nx packages compromised on NPM
aikido.dev·4h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Azure apparatchik shows custom silicon keeping everything locked down
theregister.com·18h
🔐HSM Integration
BW21-CBV-Kit——Home Video Monitoring and Playback System
hackster.io·9h
🎬Video Codecs
Research, Review, Rebuild: Intelligent Modernisation with MCP and Strategic Prompting
martinfowler.com·1h
🦋Format Metamorphosis
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.com·23h
👁️System Observability
Binary Exploitation 101 - Introduction
r1ru.github.io·1d
📼Cassette Hacking
Building an Ergonomic OpenTelemetry for JavaScript
thenewstack.io·1h
🐚Nordic Shell
Google Will Require Developer Verification Even for Sideloading
hackaday.com·13h
📜Proof Carrying Code
How to Slow Down a Program? And Why it Can Be Useful.
stefan-marr.de·4h·
Discuss: Lobsters, Hacker News
🚀Compiler Optimizations
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.net·1d
🦀Rust Macros
Interesting Technique to Launch a Shellcode, (Wed, Aug 27th)
isc.sans.edu·9h
🛡️CLI Security
What Is Mobile App Risk Management and Why Your Enterprise Needs It
nowsecure.com·3h
🔒WASM Capabilities
Qnap File Station 5: Two high-risk vulnerabilities fixed
heise.de·6h
🔓Hacking
Why Google’s Warning Highlights Critical Risk of AI Context-Injection Attacks
tenable.com·2h
📡Feed Security
SOC Visibility Quad: Why Application Telemetry Completes the Framework | Oligo Security
oligo.security·2h
👁️System Observability
Wayland Compositors – Why and How to Handle Privileged Clients (2014)
mupuf.org·2d·
Discuss: Hacker News
🔓Password Cracking
Securing FreeBSD Services with Lightweight Jails
discoverbsd.com·1d
🗄️File Systems
Why Relying on LLMs for Code Can Be a Security Nightmare
blog.himanshuanand.com·41m·
Discuss: Hacker News
🛡️WASM Security
The Struggle of Wrapping a JavaScript Game for Desktop
jslegenddev.substack.com·11h·
Discuss: Substack
🔓Open Source Software
Loading...Loading more...
AboutBlogChangelogRoadmap