🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

Crypto dev claims Trump-linked WLFI 'stole' his money
cointelegraph.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
UNAUTHORIZED WINDOWS/386
virtuallyfun.com·1d·
Discuss: Hacker News
🕸️WASM Archives
Microsoft's cloud service restored after reports of cut cables in the Red Sea
engadget.com·1d
🏴‍☠️Piracy
Helping teens navigate online racism—study shows which parenting strategy works best
phys.org·3h
🧬Bitstream Evolution
Von der Leyen flight: Lithuania warns EU of massive GPS interference
heise.de·1d
🔍Polish Cryptanalysis
Linus: "Can we please stop this automated idiocy?"
lore.kernel.org·1d·
Discuss: Hacker News
🔌Operating system internals
Microsoft cloud services disrupted by Red Sea cable cuts
bbc.com·1d
🛡Cybersecurity
Malware secretly photographs users consuming porn
heise.de·2d
🚀Indie Hacking
NEWS ROUNDUP – 6th September 2025
digitalforensicsmagazine.com·2d
🌐DNS Security
GoferBroke v1.0.6 First Release
reddit.com·1d·
Discuss: r/golang
🌊Apache Kafka
ACE-RL: Adaptive Constraint-Enhanced Reward for Long-form Generation Reinforcement Learning
arxiv.org·16h
🔲Cellular Automata
Hack The Box — Synced (rsync)
infosecwriteups.com·8h
📦Content Addressable
ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve
arxiv.org·3d
🔧Reed-Solomon
Hyper-Secure Federated Learning for Resilient 6G Spectrum Management via Dynamic Provenance Tracking
dev.to·1d·
Discuss: DEV
🎵Spectral Hashing
A Versatile and Programmable UAV Platform for Radio Access Network and End-to-End Cellular Measurements
arxiv.org·3d
📻Homebrew Protocols
Vertex-ordering and arc-partitioning problems
arxiv.org·16h
🕸️Graph Algorithms
HTB Certified Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·2d
🔐PKI Archaeology
iCloud Calendar infrastructure abused in PayPal phishing campaign
malwarebytes.com·8h
🎫Kerberos Attacks
A Love Letter to Internet Relay Chat
hackaday.com·2h
📼Cassette Networking
Phishing Empire Runs Undetected on Google, Cloudflare
darkreading.com·4d
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap