🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.org·32m
🛡️Security
iroh on QUIC Multipath
iroh.computer·1d
🐳Container Orchestration
Indexing Blockchain Events with Rust and Alloy
blog.bilinearlabs.io·1d·
Discuss: Hacker News
🦀Rust
Take Back Our Digital Infrastructure To Save Democracy
techdirt.com·10h·
Discuss: Hacker News
🐳Container Orchestration
Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
arxiv.org·32m
🦀Rust
Cisco’s Foundation AI Advances AI Supply Chain Security With Hugging Face
blogs.cisco.com·16h
🦀Rust
How we built our own MCP server in 4 simple steps
dev.to·14h·
Discuss: DEV
🦀Rust
SonicWall urges customers to disable SSLVPN amid reports of ransomware attacks
techcrunch.com·14h
🛡️Security
PentestJudge: Judging Agent Behavior Against Operational Requirements
arxiv.org·32m
✅Formal Verification
Using Closures to Extend Class Behavior Without Breaking Encapsulation
hackernoon.com·8h
🦀Rust
Uncovering memory corruption in NVIDIA Triton (as a new hire)
blog.trailofbits.com·17h·
Discuss: Hacker News
🦀Rust
Monitor your security cameras with locally processed AI
frigate.video·23h·
Discuss: Hacker News
🛡️Security
Efficient Byzantine Consensus MechanismBased on Reputation in IoT Blockchain
arxiv.org·1d
🐳Container Orchestration
🚀 Learning Update: Bash, Python, and Cybersecurity Training!
dev.to·1d·
Discuss: DEV
🦀Rust
Long-term resilience of online battle over vaccines and beyond
arxiv.org·1d
🎨UX, UI
Understanding Information Gain: Choosing the Right Questions
dev.to·3h·
Discuss: DEV
✅Formal Verification
How to Create Unbreakable Job Security: A Software Developer's Guide to Making Yourself Indispensable
getparthenon.com·1d·
Discuss: Hacker News, r/programming
🔄DevOps
Six Guidelines for Trustworthy, Ethical and Responsible Automation Design
arxiv.org·1d
🛡️Security
Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.org·1d
🦀Rust
TIL that You can spot base64 encoded JSON
ergaster.org·12h·
Discuss: Lobsters, Hacker News
🛡️Security
Loading...Loading more...
AboutBlogChangelogRoadmap