🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

BDFirewall: Towards Effective and Expeditiously Black-Box Backdoor Defense in MLaaS
arxiv.org·32m
🛡️eBPF Security
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·1d·
Discuss: Hacker News
🔐Quantum Security
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·15h
💿DAT Forensics
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.com·1d
🔐Cryptographic Archaeology
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being
forensicfocus.com·14h
🚨Incident Response
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.com·1d
🦠Malware Analysis
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·17h·
Discuss: Hacker News
🌳Archive Merkle Trees
TIL that You can spot base64 encoded JSON
ergaster.org·12h·
Discuss: Lobsters, Hacker News
🏺ZIP Archaeology
Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.com·14h
🎯Threat Hunting
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.com·5h
🌐DNS Security
Mobile app analytics library led to the PII exposure
cossacklabs.com·1d·
Discuss: Hacker News
🚨Incident Response
CFP: Ethical AI in GLAM: Challenges and Opportunities for Digital Stewardship
archivespublishing.com·13h
🏛Digital humanities
Nextcloud vs. CryptPad: Which Privacy-First Collaboration Tool is Right for You?
itsfoss.com·22h
🏠Homelab Federation
Looking back at Martin Gardner’s RSA article
johndcook.com·16h
🔲Lattice Cryptography
Evolving Security Frameworks: From Compliance Checklists to Intelligence Engines
bitsight.com·16h
🎯Threat Hunting
Why continuous security improvement for developers is the key to renewed resilience
techradar.com·1d
🎯Threat Hunting
Schizophrenic Zip Files
blog.isec.pl·17h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Software Internals Book Club
eatonphil.com·22h
⚙️Operating System Design
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·21h
✅Archive Validation
Loading...Loading more...
AboutBlogChangelogRoadmap