๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.comยท2h
๐ŸŽฏThreat Hunting
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.orgยท1h
๐Ÿฆ€Embedded Rust
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท9h
๐Ÿ‘๏ธSystem Observability
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท21h
๐Ÿ—‚๏ธVector Databases
Music to Break Models By
matthodges.comยท20h
๐Ÿ“ผCassette Hacking
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท12h
๐Ÿ’ฃZIP Vulnerabilities
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท11h
๐Ÿฆ€Rust Macros
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท4d
๐Ÿ”Cryptographic Archaeology
New Issue: International Association of Sound and Audiovisual Archives (IASA) Journal
archivespublishing.comยท11h
๐ŸŽตAudio Archaeology
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท19hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท1d
๐Ÿ”Quantum Security
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comยท11h
๐Ÿ”eBPF
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comยท15h
๐ŸšจIncident Response
Ransomware-Resilient Storage
infoq.comยท6hยท
Discuss: Hacker News
๐Ÿ’ฟWORM Storage
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท1d
๐Ÿ›กCybersecurity
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comยท11h
๐Ÿ‘๏ธPerceptual Hashing
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.toยท13hยท
Discuss: DEV
๐Ÿ”—Hash Chains
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท1d
๐ŸŽฏThreat Hunting
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap