๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.comยท5h
๐ŸŽฏThreat Hunting
Show HN: SecretMemoryLocker โ€“ File Encryption Without Static Passwords
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ”Archive Encryption
StrongBox: Simple, Safe Data Encryption for Rust
hezmatt.orgยท4h
๐Ÿฆ€Embedded Rust
Chatbots, APIs, and the Hidden Risks Inside Your Application Stack
blog.qualys.comยท12h
๐Ÿ‘๏ธSystem Observability
Learning ON Large Datasets Using Bit-String Trees
arxiv.orgยท1d
๐Ÿ—‚๏ธVector Databases
New Issue: International Association of Sound and Audiovisual Archives (IASA) Journal
archivespublishing.comยท14h
๐ŸŽตAudio Archaeology
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท15h
๐Ÿ’ฃZIP Vulnerabilities
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท15h
๐Ÿฆ€Rust Macros
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comยท4d
๐Ÿ”Cryptographic Archaeology
Enigma Crypto Transmission on Saturday August 30, 2025 @ 2000 GMT
radiomarine.orgยท23hยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
From punch cards to prompts: a history of how software got better
stackoverflow.blogยท14m
๐Ÿ”„Reproducible Builds
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.comยท1d
๐Ÿ”Quantum Security
runZero Hour, ep. 21 recap: highlights from hacker summer camp
runzero.comยท14h
๐Ÿ”eBPF
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comยท18h
๐ŸšจIncident Response
Ransomware-Resilient Storage
infoq.comยท9hยท
Discuss: Hacker News
๐Ÿ’ฟWORM Storage
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท1d
๐Ÿ›กCybersecurity
Music to Break Models By
matthodges.comยท23hยท
Discuss: Hacker News
๐Ÿ“ผCassette Hacking
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy
sciencedirect.comยท15h
๐Ÿ‘๏ธPerceptual Hashing
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.toยท17hยท
Discuss: DEV
๐Ÿ”—Hash Chains
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท1d
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap