🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎵 Audio Steganography

Hidden Data, Covert Channels, Signal Embedding, Acoustic Hiding

Windows users warned of major security issue - here's why FileFix attack could be a big concern
techradar.com·4h
🔓Hacking
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·6h·
Discuss: DEV
🧠Machine Learning
Amazon's Ring can now use AI to 'learn the routines of your residence'
theregister.com·59m
🏠Home Automation
Trusting the tech: using password managers and passkeys to help you stay secure online
ncsc.gov.uk·1d
🔓Password Cracking
Single-molecule magnet could lead to stamp-sized hard drives capable of storing 100 times more data
phys.org·5h
⚛️Quantum Tape
Worth Reading 062425
rule11.tech·4h
🌐DNS over QUIC
CA: Stop the Corporate Cover Up Act (S.B. 690)
act.eff.org·19h
🕵️Vector Smuggling
Thousands of private camera feeds found online. Make sure yours isn’t one of them
malwarebytes.com·23h
🔓Hacking
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·1d
⚔️Lean Tactics
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·18h·
Discuss: Hacker News
🔐Homomorphic Encryption
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·23h·
Discuss: Hacker News
🕸️WebP Analysis
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·2h
🔒Linear Types
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·22h
🎫Kerberos Exploitation
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
InfoSec News Nuggets 6/24/2025
aboutdfir.com·1d
🛡Cybersecurity
A large deviation view of \emph{stationarized} fully lifted blirp interpolation
arxiv.org·16h
📐Compression Bounds
North Korea - Cyber Threat Actor Profile
cstromblad.com·1h
🇸🇪Nordic Cryptography
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap