Feeds to Scour
SubscribedAll
Scoured 11736 posts in 3.14 s
From Shell to Stealth: Building AV-Evasive Binary
infosecwriteups.comยท10h
๐ŸงชBinary Fuzzing
Preview
Report Post
NEWS ROUNDUP โ€“ 15th December 2025
digitalforensicsmagazine.comยท6h
๐ŸšจIncident Response
Preview
Report Post
DeepSeek-V3.2 + DocLing + Agentic RAG: Parse Any Document with Ease
dev.toยท12hยท
Discuss: DEV
๐Ÿค–Archive Automation
Preview
Report Post
A very unscientific guide to the security of various PQC algorithms
keymaterial.netยท1dยท
Discuss: Lobsters
๐Ÿ”ฒLattice Cryptography
Preview
Report Post
The evolution of an extension language: a history of Lua
lua.orgยท1d
๐Ÿ”„Language Evolution
Preview
Report Post
Experts found an unsecured 16TB database containing 4.3B professional records
securityaffairs.comยท1d
๐Ÿ”—Data Provenance
Preview
Report Post
Reporting from the RESAW2025 Conference Workshop: Towards an โ€œAlgorithmic Archiveโ€
blogs.bodleian.ox.ac.ukยท9h
๐Ÿ”—Online Curation
Preview
Report Post
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
darkreading.comยท3h
๐Ÿ”“Hacking
Preview
Report Post
InfoSec News Nuggets 12/15/2025
aboutdfir.comยท6h
๐Ÿ”“Hacking
Preview
Report Post
Trump to hand some offsec ops against adversaries to the private sector, report
metacurity.comยท4h
๐Ÿ›กCybersecurity
Preview
Report Post
Show HN: aero.zip - I over-engineered a file transfer service (E2EE, not P2P)
aero.zipยท1dยท
Discuss: Hacker News
๐ŸบZIP Archaeology
Preview
Report Post
OpenBSD's Propolice stack protector origins
discoverbsd.comยท1d
๐Ÿ”ŒOperating system internals
Preview
Report Post
Mebus/cupp
github.comยท16h
๐Ÿ”“Password Cracking
Preview
Report Post
Your DF/IR Tool Canโ€™t Tell You Who Did It. FACT Tells You When Youโ€™re Allowed To.
brettshavers.comยท23h
๐Ÿ”—Data Provenance
Preview
Report Post
Honeypots can help defenders, or damn them if implemented badly
theregister.comยท19h
๐Ÿ”“Hacking
Preview
Report Post
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
rapid7.comยท8h
๐Ÿš€Indie Hacking
Preview
Report Post
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.comยท3dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Preview
Report Post
IDA Pro String Heuristics
gabrielcybersecurity.comยท3d
โœ…Format Verification
Preview
Report Post
Inside the AI-powered assault on SaaS: why identity is the weakest link
techradar.com
ยท1d
๐Ÿ”Capability Systems
Preview
Report Post
How to Securely Store Secrets in Environment Variables
blog.miguelgrinberg.comยท1d
๐Ÿ”Archive Encryption
Preview
Report Post