๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones
zimperium.comยท1d
๐Ÿ›กCybersecurity
Model Namespace Reuse: An AI Supply-Chain Attack Exploiting Model Name Trust
unit42.paloaltonetworks.comยท2d
๐Ÿ”’WASM Capabilities
H2-rich hydrothermal system driven by serpentinization in the western Pacific
science.orgยท8hยท
Discuss: Hacker News
๐ŸŒˆSpectroscopy
LLMs encode theory-of-mind: a study on sparse parameter patterns
nature.comยท23hยท
Discuss: Hacker News
๐Ÿ“Linear Logic
Show HN: Turn Your LinkedIn into a Professional Website in 60 Seconds
craftwebbb.comยท13hยท
Discuss: Hacker News
๐Ÿ”—Hypermedia APIs
[$] The dependency tracker for complex deadlock detection
lwn.netยท1d
๐Ÿ”eBPF
STRive: An association rule-based system for the exploration of spatiotemporal categorical data
arxiv.orgยท1d
๐Ÿ•ต๏ธMetadata Mining
Technical glitch a mystery after bungled effort to hide dozens of police, sheriffโ€™s radio channels
mercurynews.comยท1h
๐Ÿ“ผCassette Hacking
From Tracking to Personalization: Why Businesses Need IP Address APIs
dev.toยท3dยท
Discuss: DEV
๐Ÿ“กBGP Archaeology
What is payment authentication and how does it work?
fingerprint.comยท1d
๐Ÿ”คEBCDIC Privacy
Carolina Codes 2025: My First-Time Speaker Experience
dev.toยท2dยท
Discuss: DEV
โš™๏ธProof Engineering
This One Python Trick Will Make Your Code Look Like a Proโ€™s
dev.toยท3hยท
Discuss: DEV
๐Ÿ“Concrete Syntax
TopoMap: A Feature-based Semantic Discriminator of the Topographical Regions in the Test Input Space
arxiv.orgยท1d
๐Ÿ•ณ๏ธPersistent Homology
Are LLM Agents the New RPA? A Comparative Study with RPA Across Enterprise Workflows
arxiv.orgยท20h
๐ŸŒŠStream Processing
Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
wired.comยท2dยท
Discuss: Hacker News, r/technews
๐Ÿš€Indie Hacking
DDoS is the neglected cybercrime that's getting bigger. Let's kill it off
theregister.comยท4dยท
Discuss: Hacker News, Hacker News
๐Ÿ”“Hacking
Deep Reinforcement Learning for Real-Time Drone Routing in Post-Disaster Road Assessment Without Domain Knowledge
arxiv.orgยท2d
๐Ÿง Machine Learning
I Replaced Redis Locks with Database Atomicity and You Should Too
dev.toยท2dยท
Discuss: DEV
๐Ÿฆ€Rusty Databases
AI-Driven Dynamic Resource Allocation for Optimal Inter-Agency Collaboration in Disaster Response
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Towards the Datasets Used in Requirements Engineering of Mobile Apps: Preliminary Findings from a Systematic Mapping Study
arxiv.orgยท20h
๐ŸŒ€Brotli Internals
Loading...Loading more...
AboutBlogChangelogRoadmap