๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท6h
๐Ÿ‘๏ธSystem Observability
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท18h
๐Ÿ—‚๏ธVector Databases
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท9h
๐Ÿ’ฃZIP Vulnerabilities
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท8h
๐Ÿฆ€Rust Macros
New Issue: International Association of Sound and Audiovisual Archives (IASA) Journal
archivespublishing.comยท8h
๐ŸŽตAudio Archaeology
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท4d
๐Ÿ”Cryptographic Archaeology
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comยท11h
๐ŸšจIncident Response
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท16hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท1d
๐Ÿ”Quantum Security
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comยท8h
๐Ÿ”eBPF
Ransomware-Resilient Storage
infoq.comยท2hยท
Discuss: Hacker News
๐Ÿ’ฟWORM Storage
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท1d
๐Ÿ›กCybersecurity
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comยท8h
๐Ÿ‘๏ธPerceptual Hashing
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.toยท10hยท
Discuss: DEV
๐Ÿ”—Hash Chains
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท1d
๐ŸŽฏThreat Hunting
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
Securing FreeBSD Services with Lightweight Jails
discoverbsd.comยท16h
๐Ÿ—„๏ธFile Systems
Looking back at "legacy" HTML practices
nooshu.comยท1hยท
Discuss: Hacker News
๐ŸบFormat Archaeology
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท3dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap