๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

DNS at IETF 123
potaroo.netยท8h
๐ŸŒDNS Security
How to detect Tor traffic & block high-risk anonymity networks
fingerprint.comยท15h
๐Ÿง…Tor Networks
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.comยท8h
๐ŸŒDNS Security
Fail-Open: Reckless or Resilient?
nextorbit.coยท4hยท
Discuss: Hacker News
๐Ÿ›ก๏ธError Boundaries
Real-World Evaluation of Protocol-Compliant Denial-of-Service Attacks on C-V2X-based Forward Collision Warning Systems
arxiv.orgยท3h
๐ŸŒธBloom Variants
SonicWall investigates possible zero-day amid Akira ransomware surge
securityaffairs.comยท22h
๐Ÿ”“Hacking
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.comยท20h
๐ŸŽฏThreat Hunting
ssh/RDP to home PC
noip.comยท9hยท
Discuss: r/homelab
๐ŸŒDNS Security
Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.comยท17h
๐ŸŽฏThreat Hunting
4th August โ€“ Threat Intelligence Report
research.checkpoint.comยท1d
๐Ÿ”“Hacking
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation
circleid.comยท1d
๐ŸŒDNS Security
Living Off the Cloud: Abusing Cloud Services for Red Teaming
infosecwriteups.comยท2d
๐ŸŽซKerberos Exploitation
Millions at risk as global network of over 5,000 fake pharmacy websites uncovered by security researchers โ€” here's how to stay safe
techradar.comยท12h
๐Ÿฆ Malware Analysis
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท1d
โš—๏ธAlgebraic Coding
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgยท3d
๐Ÿ’ฃZIP Vulnerabilities
Ranking the top threats and techniques for the first half of 2025
redcanary.comยท18h
๐ŸŽฏThreat Hunting
Securing OAuth: Best Practices for Safer Authorization Flows
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏNTLM Attacks
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
theregister.comยท21h
๐ŸŽฏThreat Hunting
Welcoming Guardio to Have I Been Pwned's Partner Program
troyhunt.comยท11h
๐ŸบKerberos Archaeology
Top 10 security threats to K-12 schools
jamf.comยท10h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap