🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌊 Audio Watermarking

Steganography, Copyright Protection, Inaudible Metadata, Signal Processing

Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·9h
🎫Kerberos Attacks
A Nested Watermark for Large Language Models
arxiv.org·1d
💧Manuscript Watermarks
OpenADP, needs volunteers to help prevent mass secret surveillance
openadp.org·17h·
Discuss: Hacker News
🔐Homomorphic Encryption
North Korea - Cyber Threat Actor Profile
cstromblad.com·39m
🇸🇪Nordic Cryptography
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·16m
🎯Threat Hunting
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·9h
🎯Threat Hunting
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
Show HN: MIDI Transport to Mute
github.com·19h·
Discuss: Hacker News
🎛️Cassette DSP
You might not be getting the highest quality audio when listening to music on your phone – here's how to change that
techradar.com·2d
🎵Audio Codecs
Deaf and Hard of Hearing WG Meeting - 2025-06-24
youtube.com·4h
✋Tactile Computing
Testing AirPods 4’s Beta Update and Improved Recording Quality for Voice Notes
macstories.net·7m
🎵Audio Codecs
Announcing crabstep: A pure Rust, cross-platform, zero-dependency Apple/NeXTSTEP typedstream deserializer
github.com·1h
🔒Linear Types
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🦠Malware Analysis
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Spotify may launch lossless audio after years of delays
androidcentral.com·2d·
Discuss: Hacker News
🎵Audio Streaming
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·21h
🎫Kerberos Exploitation
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·1d
⚔️Lean Tactics
Physical Layer Challenge-Response Authentication between Ambient Backscatter Devices
arxiv.org·1d
👁️Perceptual Hashing
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
Learning to assess subjective impressions from speech
arxiv.org·15h
👁️Perceptual Coding
Loading...Loading more...
AboutBlogChangelogRoadmap