๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Archive Cryptanalysis

Historical Encryption, Digital Forensics, Cipher Recovery, Media Authentication

New single-molecule magnet tech could unlock hard drives with 100x more capacity โ€” drives could store three terabytes per square centimeter
tomshardware.comยท2hยท
Discuss: r/technews
๐ŸงฒMagnetic Domains
Beyond Theory โ€“ Interview with Jill Delaney by Juan Alonso
ica.orgยท21h
๐Ÿ›๏ธPREMIS
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgยท2d
๐Ÿฆ Malware Analysis
How to Prove That An Email Was Received
metaspike.comยท17h
๐Ÿ“„Document Digitization
abhisheksr01/spring-boot-microservice-best-practices
github.comยท11h
๐ŸŒŠStreaming Systems
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devยท1dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
Why Binary Won and Nothing Else Even Got Close
b0a04gl.siteยท1dยท
Discuss: Hacker News
๐ŸงฒRISC-V Archaeology
Single-molecule magnet could lead to stamp-sized hard drives capable of storing 100 times more data
phys.orgยท21h
โš›๏ธQuantum Tape
The Impact of the Russia-Ukraine Conflict on the Cloud Computing Risk Landscape
arxiv.orgยท8h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
SSL and TLS Deployment Best Practices
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Machine Learning Fundamentals: active learning with python
dev.toยท19hยท
Discuss: DEV
๐Ÿง Machine Learning
Why document-borne malware needs to be back on the radar for organization
techradar.comยท2d
๐Ÿ”“Hacking
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.comยท1d
๐Ÿ”“Hacking
How Not to Get Lost in PCI DSS Standards โ€” A Tech Teamโ€™s Perspective
hackernoon.comยท1d
๐Ÿ”—Data Provenance
Exploiting Android Components in Seconds
infosecwriteups.comยท2h
โšกPerformance Tools
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท1dยท
Discuss: DEV
๐ŸŽตSpectral Hashing
And Now Malware That Tells AI to Ignore It?
darkreading.comยท15h
๐Ÿ”“Hacking
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comยท1d
๐ŸŽซKerberos Attacks
๏ธ Stop API Key Leaks Before They Cost You โ€” Meet KeySentry
infosecwriteups.comยท2d
๐Ÿš€Indie Hacking
rustzen-admin Series (Part 1): Authentication Security Upgrade - From bcrypt to Argon2
dev.toยท2dยท
Discuss: DEV
๐Ÿ”“Password Cracking
Loading...Loading more...
AboutBlogChangelogRoadmap