🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Thousands displaced in northern Ghana as ethnic clashes spread
rfi.fr·8h
🌐BGP Security
NYC’s Favorite ‘Folk Sandwich’
atlasobscura.com·4h
📼Cassette Culture
When It Comes to Spotting Fake Receipts, It’s A.I. vs. A.I.
nytimes.com·5h
🚀Indie Hacking
Weeknotes #340 — Dusty songfield
andrewdoran.uk·2d
📰RSS Archaeology
Primary Keys in Sharded Databases
pgdog.dev·2d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Digest #178: GitHub Secrets Leak, Building an AI Server, Docker→Kubernetes and ArgoCD Anti-Patterns
devopsbulletin.com·1d
❄️Nix Flakes
Show HN: No More Vendor Lock-In: Our Open-Source Protocol for AI Portability
github.com·2d·
Discuss: Hacker News
🔌Interface Evolution
Pluralistic: Why Wikipedia works (05 Sep 2025)
pluralistic.net·23h·
Discuss: Hacker News
📰Content Curation
I built a simple HTTP key-value store in Go (learning project) – feedback welcome
reddit.com·1d·
Discuss: r/golang
🌊Streaming Databases
Black Hat Training Attendees Scan Aviation Organization
blogs.cisco.com·3d
🎯Threat Hunting
KubeCrash is Back: Hear from Engineers at Grammarly, J.P. Morgan, and More (Sep 23)
reddit.com·1d·
Discuss: r/kubernetes
📦Container Security
Critical SAP S/4HANA Vulnerability Under Attack, Patch Now
darkreading.com·20h
🔓Hacking
Is it a bird? Is it a plane? No, it's "super core" - Intel's latest patent revives ancient 'anti-hyperthreading' CPU technique in an attempt to boost processor ...
techradar.com·5h
🖥️Hardware Architecture
Hackers use Ethereum smart contracts to conceal malware in code libraries
theblock.co·2d·
Discuss: Hacker News
🚀Indie Hacking
Diffusion-RL Based Air Traffic Conflict Detection and Resolution Method
arxiv.org·1d
🔲Cellular Automata
Evaluating Diverse Feature Extraction Techniques of Multifaceted IoT Malware Analysis: A Survey
arxiv.org·2d
🦠Malware Analysis
Securing DNS With Umbrella at Black Hat
blogs.cisco.com·3d
🌐DNS Security
Context Engineering: Rapid Agent Prototyping – Jason Liu
jxnl.co·22h·
Discuss: Hacker News
⚡Proof Automation
Rust for Linux – Encoding the trust of data in the type system
lwn.net·1d·
Discuss: Hacker News
🦀Rust Borrowing
Closing the Visibility Gap: A Monitoring Framework for Verifiable Open RAN Operations
arxiv.org·2d
🔍eBPF
Loading...Loading more...
AboutBlogChangelogRoadmap