🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ›‘οΈ ARM TrustZone

Secure World, Trusted Execution Environment, Hardware Security, Mobile Security

Goodbye, Intel! The chips keep changing, but the Mac remains the Mac (Macworld/Jason Snell)
macworld.comΒ·7h
πŸ–₯️Vintage Macintosh
North Korea - Cyber Threat Actor Profile
cstromblad.comΒ·24m
πŸ‡ΈπŸ‡ͺNordic Cryptography
CVE-2025-32978 - Quest KACE SMA Unauthenticated License Replacement
seclists.orgΒ·1d
πŸ”Certificate Analysis
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·8h
🎯Threat Hunting
Tailnet Lock is generally available
tailscale.comΒ·1d
πŸ”—Hash Chains
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comΒ·1d
🎫Kerberos Exploitation
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.comΒ·20h
🎫Kerberos Exploitation
Toward Trustworthy AI: A Zero-Trust Framework for Foundational Models
content.knowledgehub.wiley.comΒ·1d
πŸ”’Language-based security
Quantum computing: secure in the long term thanks to QKD
heise.deΒ·6h
πŸ”Quantum Security
Secure User-friendly Blockchain Modular Wallet Design Using Android & OP-TEE
arxiv.orgΒ·1d
πŸ”—Hash Chains
Tried this minimalist phone and it was a weird experience
pocket-lint.comΒ·1dΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Password Manager for M5Stack Cardputer
hackster.ioΒ·3d
πŸ”“Password Cracking
Maturing your smart contracts beyond private key risk
blog.trailofbits.comΒ·1d
πŸ”Quantum Security
Which operating system was targeted by the first ever mobile phone virus?
techspot.comΒ·13m
πŸ”“Hacking
libai: A C library for embedding Apple Intelligence on-device Foundation models in any application with full support for native tool calling and MCP.
github.comΒ·2dΒ·
Discuss: Hacker News, r/programming
πŸŒ€Brotli Internals
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.comΒ·11h
🎯Threat Hunting
Fixes for five Lix CVEs
lix.systemsΒ·1dΒ·
Discuss: Lobsters
❄️Nix Adoption
SSL and TLS Deployment Best Practices
github.comΒ·19hΒ·
Discuss: Hacker News
πŸ”Certificate Analysis
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·9h
🎫Kerberos Attacks
Unsupervised Learning NO. 486
newsletter.danielmiessler.comΒ·2d
πŸ•΅οΈVector Smuggling
Loading...Loading more...
AboutBlogChangelogRoadmap