🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Strikes across the Gaza Strip kill at least 31 as international experts accuse Israel of genocide
lemonde.frΒ·20h
🌐WARC Forensics
Worth Reading 082925
rule11.techΒ·3d
πŸ“ŸHistorical Protocols
Introduction - Jujutsu for everyone
jj-for-everyone.github.ioΒ·14h
🌳Git Internals
Estimating the predictability of questionable open-access journals
science.orgΒ·2dΒ·
Discuss: Hacker News
πŸ“°Content Curation
A hidden simplicity behind how people move: Study reveals geography's role in relocation
phys.orgΒ·1d
πŸ”ΆVoronoi Diagrams
Salt Typhoon hacks declared national security crisis
the-independent.comΒ·1d
πŸ›‘Cybersecurity
Magnetic fields in infant universe may have been billions of times weaker than a fridge magnet
phys.orgΒ·1h
🌑️Preservation Physics
Ask HN: Can/Will server, network and security jobs ever be outsourced?
news.ycombinator.comΒ·4hΒ·
Discuss: Hacker News
🏠Homelab Pentesting
I got a job at Google 2 years ago. Here's what's changed and my advice for new engineers entering Big Tech.
businessinsider.comΒ·10h
πŸŒ€Brotli Internals
Adaptive Preference Inference via Multi-Modal Graph Reasoning for Personalized Travel Route Optimization
dev.toΒ·13hΒ·
Discuss: DEV
πŸŽ›οΈFeed Filtering
Deploy Amazon Bedrock Knowledge Bases using Terraform for RAG-based generative AI applications
aws.amazon.comΒ·3h
🧱Immutable Infrastructure
Automated Assessment of Bioactive Compound Efficacy via Multi-Modal Data Fusion and Bayesian Optimization
dev.toΒ·3hΒ·
Discuss: DEV
πŸ”Vector Forensics
Fraudster stole over $1.5 million from city of Baltimore
securityaffairs.comΒ·1d
🎫Kerberos Attacks
Why Markdown Is the De Facto Standard for Prompt Engineering
dev.toΒ·6hΒ·
Discuss: DEV
🌳Incremental Parsing
The Feature I Almost Abandoned (That Users Loved Most)
dev.toΒ·8hΒ·
Discuss: DEV
πŸ”—Topological Sorting
Microsoft-backed boffins show mega speed boost with hollow-core fiber
theregister.comΒ·1d
πŸ–₯️Modern Terminals
From Shodan to SQLi: Hacking an Exposed Company Dashboard
infosecwriteups.comΒ·2d
πŸ”“Hacking
Benchmarking the State of Networks with a Low-Cost Method Based on Reservoir Computing
arxiv.orgΒ·1d
🧠Machine Learning
Anatomy of Email Security Vulnerabilities: How Spoofing, Protocol Weaknesses, and Misconfigurations Power Modern Attacks
dev.toΒ·2dΒ·
Discuss: DEV
🌐DNS Security
Automated Multi-Scale Anomaly Detection in Granular Material Simulations via Hybrid Tensor-Graph Networks
dev.toΒ·1dΒ·
Discuss: DEV
πŸ•ΈοΈTensor Networks
Loading...Loading more...
AboutBlogChangelogRoadmap