🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛣️ BGP Hijacking

Route Security, Network Archaeology, Internet Routing, Protocol Analysis

A polar week
blog.mitrichev.ch·4h·
Discuss: blog.mitrichev.ch
🕸️Graph Algorithms
This Billionaire’s AI Was Supposed To Speed Up Policing. It’s Not Going Well.
forbes.com·8h
🎯Threat Hunting
NYU team behind AI-powered malware dubbed ‘PromptLock’
cyberscoop.com·2h
🚀Indie Hacking
X Marks the Spot: Navigating Possible Futures with Wardley Maps • Simon Wardley • GOTO 2024
youtube.com·2d
🌍Cultural Algorithms
NixOS Is the Endgame of Distrohopping
joshblais.com·9h·
Discuss: Lobsters, Hacker News
❄Nix
The Great Bitnami BSI Shift: What the New Costs and Licenses Mean for End Users
iits-consulting.de·1d·
Discuss: Hacker News
🏺ZIP Archaeology
ActivityPub message rewrite facility (MRF) based on WASM
aumetra.xyz·12h·
Discuss: Hacker News
🔒WASM Capabilities
Why Powerful But Hard To Detect Backdoors Could Become A Routine Problem For Open Source Projects Because Of AI
techdirt.com·15h·
Discuss: Hacker News
🔓Hacking
Why the Internet Is Worse Than Ever
macleans.ca·16h·
Discuss: Hacker News
🧲Magnetic Philosophy
Phishing Empire Runs Undetected on Google, Cloudflare
darkreading.com·22h
🎫Kerberos Exploitation
Taming The Three-Headed Dog -Kerberos Deep Dive Series
blog.compass-security.com·3d·
Discuss: Hacker News
🎫Kerberos Exploitation
MCP OAuth 2.1 - A Complete Guide
dev.to·1d·
Discuss: DEV
🔐PAKE Protocols
Detail about Linkity Link
bradbarrish.com·3d·
Discuss: Hacker News
📰RSS Archaeology
US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Attack
securityweek.com·5h·
Discuss: Hacker News
🔓Hacking
China-aligned crew poisons Windows servers to manipulate Google results
theregister.com·21h
🎫Kerberos Exploitation
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
portswigger.net·2d·
Discuss: Lobsters, Hacker News, r/programming
🛡️Security Headers
VulRTex: A Reasoning-Guided Approach to Identify Vulnerabilities from Rich-Text Issue Report
arxiv.org·14h
✅Format Verification
Thermoptic – HTTP proxy which cloaks requests as Chrome across all stack layers
github.com·3d·
Discuss: Hacker News
🚀Indie Hacking
Your Domain, My Playground: Hijacking Your Link Previews ‍
infosecwriteups.com·12h
🌐DNS Security
Hacked Routers Linger on the Internet for Years, Data Shows
darkreading.com·2d
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap