🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

The internet still runs on 1980s protocols – that should worry you
techradar.comΒ·1d
πŸ“‘BGP Archaeology
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgΒ·7h
πŸ”—Hash Chains
RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgΒ·2d
🌐DNS Security
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.comΒ·23h
πŸ“‘BGP Archaeology
Does DNS Security Matter?
systemsapproach.orgΒ·2d
🌐DNS Security
APIs Are Eating the Internetβ€”And Hackers Are Eating APIs
hackernoon.comΒ·6h
πŸ”“Hacking
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizΒ·6h
πŸ”“Hacking
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comΒ·11hΒ·
Discuss: Lobsters, Hacker News
πŸ›‘οΈeBPF Security
Cloudflare 1.1.1.1 Incident on July 14, 2025
blog.cloudflare.comΒ·7hΒ·
Discuss: Hacker News
πŸ›£οΈBGP Hijacking
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comΒ·22h
🦠Malware Analysis
Ransomware Threat Landscape Analysis - May through July for 2025
cstromblad.comΒ·1d
🦠Malware Analysis
14th July – Threat Intelligence Report
research.checkpoint.comΒ·1d
πŸ”“Hacking
Unmasking AsyncRAT: Navigating the labyrinth of forks
welivesecurity.comΒ·1d
🧬Bitstream Evolution
Triggering QUIC
potaroo.netΒ·1d
🌐DNS over QUIC
Will the internet heal itself?
aardvark.co.nzΒ·1d
πŸ•ΈοΈMesh Networks
An LLM Router That Thinks Like an Engineer
medium.comΒ·17hΒ·
Discuss: Hacker News
πŸ“‘BGP Archaeology
πŸ” Introducing EMCL – A Secure Protocol for AI Agents to Call Tools
dev.toΒ·19hΒ·
Discuss: DEV
🌐NetworkProtocols
DDoS peaks hit new highs: Cloudflare mitigated massive 7.3 Tbps assault
securityaffairs.comΒ·2h
🎫Kerberos Attacks
How Criminal Networks Exploit Insider Vulnerabilities
darkreading.comΒ·21h
πŸ”“Hacking
Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation
darknet.org.ukΒ·10h
🦠Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap