🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

25th August – Threat Intelligence Report
research.checkpoint.comΒ·1d
πŸ”“Hacking
nodeWSNsec: A hybrid metaheuristic approach for reliable security and node deployment in WSNs
arxiv.orgΒ·8h
πŸ•ΈοΈNetwork Topology
Can I possibly get some help with this design?
reddit.comΒ·18hΒ·
Discuss: r/homelab
πŸ›£οΈBGP Hijacking
Trust Spanning Protocol (TSP) Specification
trustoverip.github.ioΒ·22hΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
RomCom and TransferLoader IoCs in the Spotlight
circleid.comΒ·21h
πŸ“‘DNS Archaeology
Go module for brute force attacks on SSH steals the accesses found
heise.deΒ·1d
πŸ›£οΈBGP Hijacking
Episode 100
reloadin.netΒ·17hΒ·
Discuss: Hacker News
πŸ“‘Network Protocol Design
Securing FreeBSD Services with Lightweight Jails
discoverbsd.comΒ·6h
πŸ—„οΈFile Systems
HOW TO HIRE A HACKER TO RECOVER LOST OR STOLEN BITCOIN : GRAVOY TECH NETWORK
dev.toΒ·1hΒ·
Discuss: DEV
πŸ”—Hash Chains
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.comΒ·22h
🎯Threat Hunting
InfoSec News Nuggets 8/25/2025
aboutdfir.comΒ·1d
πŸ”“Hacking
Zero Trust Revisited
systemsapproach.orgΒ·1d
πŸ•ΈοΈMesh Networks
A neat idea, but I can see this leading to the Balkanization of the Internet
boston.conman.orgΒ·10h
πŸ›‘Cybersecurity
IBC2025: GlobalM to showcase next-gen live IP video transport
madcornishprojectionist.co.ukΒ·1d
⏱️SMPTE Timecode
Techno Security & Digital Forensics Conference Returns To San Diego With Deep Dive Into AI, Cybercrime, And Justice
forensicfocus.comΒ·2h
🚨Incident Response
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comΒ·2dΒ·
Discuss: www.blogger.com
🎯Threat Hunting
Piracy and armed robbery surge in the straits of Malacca and Singapore – report
theguardian.comΒ·13h
πŸ΄β€β˜ οΈPiracy
Fast-Spreading, Complex Phishing Campaign Installs RATs
darkreading.comΒ·21h
πŸ”“Hacking
Fragmented SSE Is a Risk You Can’t Afford
blogs.cisco.comΒ·54m
πŸ”Capability Systems
Some recent project milestones
markjgsmith.comΒ·1d
πŸ”ŒInterface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap