🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ eBPF Security

Kernel Programming, Runtime Monitoring, Network Filtering, Syscall Tracing

Asus's new BTF GPUs can now be used in standard systems courtesy of a detachable 1000W power connector — New 5090 and RTX 5070 Ti models have a dual personality
tomshardware.com·4h
🖥️Modern Terminals
Switching to eBPF One Step at a Time with Calico DNS Inline Policy
tigera.io·2d
🌐DNS over QUIC
ICE Rolls Facial Recognition Tools Out to Officers' Phones
wired.com·3h
🛡Cybersecurity
Disabling Intel Graphics Security Mitigations Can Boost GPU Compute Performance
quiz.businessexplain.com·2d·
Discuss: Hacker News
🛡️RISC-V Security
How we turned a real car into a Mario Kart controller by intercepting CAN data
pentestpartners.com·2d·
Discuss: Hacker News
⚙️Cassette Mechanics
Elastic's journey to build Elastic Cloud Serverless
elastic.co·1d·
Discuss: Hacker News
🌐Edge Preservation
ECMAScript 2025 Language Specification
tc39.es·1d·
Discuss: Hacker News
🎯Gradual Typing
Memory Safety Is Merely Table Stakes
usenix.org·1d·
Discuss: Lobsters, Hacker News, r/programming
🔒Type Safety
Top Apple, Google VPN Apps May Help China Spy on Users
darkreading.com·17h
🔓Hacking
ExteBrowser Extension Recon: Tools and Methods for Analyzing Target-Owned Extensions
infosecwriteups.com·4h
🚀Indie Hacking
Security vulnerabilities in nearly 750 multifunction printers of various brands
heise.de·1d
💣ZIP Vulnerabilities
A Developer’s Guide to Building Scalable AI: Workflows vs Agents
towardsdatascience.com·19h
⚡Proof Automation
Charting a New Course: Elevating API Testing with Keploy's Generative Power
dev.to·8h·
Discuss: DEV
🧪CBOR Fuzzing
From Zero to Your First Valid Vulnerability Report in 7 Days
infosecwriteups.com·4h
🔓Hacking
Libxml2's "no security embargoes" policy
lwn.net·2d·
Discuss: Hacker News
🔓Open Source Software
BSD Now 616: Insights from FreeBSD Foundation Leaders
discoverbsd.com·4d
🔌Operating system internals
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·3d
🤖Network Automation
The Bug Was One Character Long: Lessons From My First Full Stack App
dev.to·17h·
Discuss: DEV
🌳Incremental Parsing
Ubuntu Fundamentals: kernel
dev.to·6d·
Discuss: DEV
🔍eBPF
Heartbeat of Modern Web Real Time Patterns User Design(1751092563961200)
dev.to·7h·
Discuss: DEV
🌊Stream Processing
Loading...Loading more...
AboutBlogChangelogRoadmap