Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🪝 eBPF
Specific
extended BPF, bpftrace, libbpf, XDP, kernel probes
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183800
posts in
26.0
ms
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
📡
Protocol Design
datatracker.ietf.org
·
4d
·
Hacker News
[Dev Weekly #108] Kimi K2.6
Crushes
Long-Horizon Coding | DeepSeek V4 | ChatGPT Images 2.0 |
Bitwarden
CLI Compromised | GitHub Copilot’s Big Retreat | Vercel’s Security Nightmare
💣
Binary Exploitation
blog.codeminer42.com
·
5d
Microsoft
LiteBox
: a library OS for secure
sandboxing
and running Linux apps on Windows
💣
Binary Exploitation
4sysops.com
·
5d
Your Java
Runtime
Has a Security Update. Did You
Apply
It?
💣
Binary Exploitation
azul.com
·
5d
April 23, 2026
💣
Binary Exploitation
the grugq's newsletter via buttondown.com
·
6d
The Vehicle May Be Sick: Denial of
Diagnostic
Services by
Exploiting
the CAN Transport Protocol
📡
Protocol Design
arxiv.org
·
2d
EPYC and Storage VPS @ Frankfurt
Equinix
FR7
| 10Gbps | 20GB RAM for 8€! 🇩🇪
🖧
Hypervisors
lowendtalk.com
·
6d
The First Tool to Provide
Truly
End-to-End Data Discovery,
Observability
, and Trust
🏗️
AI Infrastructure
opendatadiscovery.org
·
4d
Bitwarden
💣
Binary Exploitation
flathub.org
·
6d
Formal
Verification, Integration and Physical Evaluation of Prime-Field
Masking
on Silicon
⚙️
ISA Design
eprint.iacr.org
·
6d
CUJBench
: Benchmarking LLM-Agent on Cross-Modal Failure Diagnosis from Browser to
Backend
🏗️
AI Infrastructure
arxiv.org
·
2d
DslsDZC/HIC
: HIC: A hierarchical isolation kernel reference architecture. Unifying security, performance, and
modularity
in a single design, enabling deployment from embedded to cloud with full lifecycle evolution.
🏗️
Jails
github.com
·
1d
·
Hacker News
Security updates for Friday [
LWN.net
]
😈
FreeBSD
lwn.net
·
6d
A
systematic
literature
Review for Transformer-based Software Vulnerability detection
💣
Binary Exploitation
arxiv.org
·
1d
Podcast: A Java Performance Quest:
Taming
Unsafe Code, Embracing
Idiomatic
Style & Debugging the Linux Kernel
⚙️
Low-Level Programming
infoq.com
·
3d
Agentic Harness Engineering:
Observability-Driven
Automatic Evolution of Coding-Agent
Harnesses
🌐
Distributed Systems
arxiv.org
·
1d
War Story: Debugging a
Kafka
4.0 Consumer Lag Spike During a Product Launch Using
Cilium
1.17 and Datadog 2026
🏗️
AI Infrastructure
github.com
·
1d
·
DEV
Dictionary
learning for Kernel
EDMD
🗄️
Vector Databases
arxiv.org
·
1d
Cross-Lingual
Jailbreak Detection via Semantic
Codebooks
💣
Binary Exploitation
arxiv.org
·
1d
Kernel
prepatch
7.1-rc1
🔒
Capsicum
lwn.net
·
3d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help