🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Cyber security
Oh, great.Three notorious cybercrime gangs appear to be collaborating
theregister.com·20h·
Discuss: Hacker News
🕵Threat intelligence
AI in Cybersecurity in 2025
dev.to·1d·
Discuss: DEV
🕵Threat intelligence
Stack Overflow is trying to honeypot their data dump
meta.stackexchange.com·12h·
Discuss: Hacker News
🕵Threat intelligence
Hackers breach and expose a major North Korean spying operation
techcrunch.com·15h
🕵Threat intelligence
Sloppy AI defenses take cybersecurity back to the 1990s, researchers say
scworld.com·19h·
Discuss: Hacker News
🕵Threat intelligence
How Graphs Boost LLM Precision and Explainability in Cybersecurity
hackernoon.com·1d
🕵Threat intelligence
OverTheWire: Learn and practice security concepts through fun games
overthewire.org·3h·
Discuss: Hacker News
🕵Threat intelligence
MLS: The Naked King of End-to-End Encryption
poberezkin.com·11h·
Discuss: Hacker News
🕵Threat intelligence
Show HN: Enter your domain and my open-source agent will hack it
github.com·1d·
Discuss: Hacker News, r/SoftwareEngineering
🤖AI
Claude is competitive with humans in (some) cyber competitions
red.anthropic.com·2d·
Discuss: Hacker News
🤖AI
Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking
securityweek.com·19h·
Discuss: Hacker News
🕵Threat intelligence
Manpower discloses data breach affecting nearly 145,000 people
bleepingcomputer.com·19h·
Discuss: Hacker News
🕵Threat intelligence
Understanding the Security Landscape of MCP
apideck.com·2d·
Discuss: Hacker News
🕵Threat intelligence
Building Safeguards for Claude
anthropic.com·1d·
Discuss: Hacker News
🕵Threat intelligence
Obfuscated Quantum and Post-Quantum Cryptography
arxiv.org·1d
🕵Threat intelligence
Darcula and the Magic Cat: How Osint Unmasked a Phishing Tycoon
osint.industries·2h·
Discuss: Hacker News
🕵Threat intelligence
Sloppy AI Defenses Take Cybersecurity Back To the 1990s, Researchers Say
it.slashdot.org·10h
🕵Threat intelligence
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation
arxiv.org·1d
🕵Threat intelligence
Understanding the security landscape of MCP
dev.to·23h·
Discuss: DEV
🕵Threat intelligence
The ex-CIA agents deciding Facebook's content policy
mronline.org·17h·
Discuss: Hacker News
🕵Threat intelligence
Loading...Loading more...
AboutBlogChangelogRoadmap