๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.comยท11hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.comยท1d
๐Ÿ”Cryptographic Archaeology
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท1d
๐Ÿฆ Malware Analysis
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท1d
โš—๏ธAlgebraic Coding
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.inkยท2hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท9h
โšกProof Automation
Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.comยท23h
๐ŸšจIncident Response
Mobile app analytics library led to the PII exposure
cossacklabs.comยท21hยท
Discuss: Hacker News
๐ŸšจIncident Response
Why continuous security improvement for developers is the key to renewed resilience
techradar.comยท22h
๐ŸŽฏThreat Hunting
Nextcloud vs. CryptPad: Which Privacy-First Collaboration Tool is Right for You?
itsfoss.comยท6h
๐Ÿ Homelab Federation
Evolving Security Frameworks: From Compliance Checklists to Intelligence Engines
bitsight.comยท1h
๐ŸŽฏThreat Hunting
Looking back at Martin Gardnerโ€™s RSA article
johndcook.comยท1h
๐Ÿ”ฒLattice Cryptography
Schizophrenic Zip Files
blog.isec.plยท2hยท
Discuss: Hacker News
๐Ÿ’ฃZIP Vulnerabilities
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.comยท2h
๐ŸŽฏThreat Hunting
Best of use of small structured media enclosure
i.redd.itยท4hยท
Discuss: r/homelab
๐Ÿ’ฝMiniDisc Technology
Software Internals Book Club
eatonphil.comยท7h
โš™๏ธOperating System Design
Stop Exposing Your Data: How to Pack IDs, UUIDs, and More with Obfusbit
dev.toยท18hยท
Discuss: DEV
๐Ÿ’ฃCompression Security
MacOS Under Attack: How Organizations Can Counter Rising Threats
darkreading.comยท17h
๐Ÿ”“Hacking
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท6h
โœ…Archive Validation
Video: A look at Kgeotag on FreeBSD
discoverbsd.comยท1d
๐Ÿ”ŒOperating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap