🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Thousands displaced in northern Ghana as ethnic clashes spread
rfi.fr·4h
🌐BGP Security
When It Comes to Spotting Fake Receipts, It’s A.I. vs. A.I.
nytimes.com·1h
🚀Indie Hacking
Weeknotes #340 — Dusty songfield
andrewdoran.uk·2d
📰RSS Archaeology
Primary Keys in Sharded Databases
pgdog.dev·1d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Digest #178: GitHub Secrets Leak, Building an AI Server, Docker→Kubernetes and ArgoCD Anti-Patterns
devopsbulletin.com·21h
❄️Nix Flakes
AI-Driven Dynamic Delivery Route Optimization via Multi-Modal Graph Neural Networks
dev.to·10h·
Discuss: DEV
🌀Riemannian Computing
My Experience Running OpenStack in a Homelab
reddit.com·23h·
Discuss: r/homelab
🏠Homelab Clusters
Pluralistic: Why Wikipedia works (05 Sep 2025)
pluralistic.net·19h·
Discuss: Hacker News
📰Content Curation
In the rush to adopt hot new tech, security is often forgotten. AI is no exception
theregister.com·4d·
Discuss: Hacker News
🌐BGP Security
I built a simple HTTP key-value store in Go (learning project) – feedback welcome
reddit.com·1d·
Discuss: r/golang
🌊Streaming Databases
Black Hat Training Attendees Scan Aviation Organization
blogs.cisco.com·3d
🎯Threat Hunting
Is it a bird? Is it a plane? No, it's "super core" - Intel's latest patent revives ancient 'anti-hyperthreading' CPU technique in an attempt to boost processor ...
techradar.com·1h
🖥️Hardware Architecture
KubeCrash is Back: Hear from Engineers at Grammarly, J.P. Morgan, and More (Sep 23)
reddit.com·22h·
Discuss: r/kubernetes
📦Container Security
Critical SAP S/4HANA Vulnerability Under Attack, Patch Now
darkreading.com·17h
🔓Hacking
Hackers use Ethereum smart contracts to conceal malware in code libraries
theblock.co·2d·
Discuss: Hacker News
🚀Indie Hacking
Diffusion-RL Based Air Traffic Conflict Detection and Resolution Method
arxiv.org·1d
🔲Cellular Automata
Evaluating Diverse Feature Extraction Techniques of Multifaceted IoT Malware Analysis: A Survey
arxiv.org·2d
🦠Malware Analysis
Securing DNS With Umbrella at Black Hat
blogs.cisco.com·3d
🌐DNS Security
Context Engineering: Rapid Agent Prototyping – Jason Liu
jxnl.co·18h·
Discuss: Hacker News
⚡Proof Automation
Rust for Linux – Encoding the trust of data in the type system
lwn.net·1d·
Discuss: Hacker News
🦀Rust Borrowing
Loading...Loading more...
AboutBlogChangelogRoadmap