๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Data: a swift-foundation deep-dive
blog.jacobstechtavern.comยท14h
๐ŸบProtocol Archaeology
From building ships to shipping builds: how to succeed in making a career switch to software development
ounapuu.eeยท2h
๐Ÿ“Code Metrics
New DDoS Attack Record โ€“ The MSP Cyber News Snapshot โ€“ June 26th
heimdalsecurity.comยท4d
๐Ÿ”“Hacking
Show HN: I made a zero-log, ephemeral, E2EE web chat
trashtalk.meยท1dยท
Discuss: Hacker News
๐Ÿ“ผCassette Networks
Remixing Shopify's Admin: How We Made It 30% Faster and AI-Ready
shopify.engineeringยท1dยท
Discuss: Hacker News
๐Ÿฆ‹Format Metamorphosis
How Ionos.com Forced Our Product to Rebrand: A Cautionary Tale
etasko.comยท4dยท
Discuss: Hacker News
๐Ÿ“กDNS Archaeology
5 ways to use a home security camera โ€“ and why you need one right now
techradar.comยท1d
๐Ÿ Home Automation
Losing Sales to Cart Abandonment? AI Can Boost Conversions 3x
techolution.comยท14hยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Why Artificial Integrity Must Overtake Artificial Intelligence
forbes.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
How World Models Laid the Foundation for Artificial General Intelligence
hackernoon.comยท1d
๐Ÿ”ฒCellular Automata
'CitrixBleed 2' Shows Signs of Active Exploitation
darkreading.comยท3d
๐Ÿ“ฆContainer Security
Counting Down Capabilities to AGI
shash42.substack.comยท1dยท
Discuss: Substack
๐Ÿง Intelligence Compression
Correlated Mutations for Integer Programming
arxiv.orgยท1h
๐ŸŒธBloom Variants
Taking over millions of developers exploiting an Open VSX Registry flaw
securityaffairs.comยท3d
๐ŸŒWASI
Frequently Asked Questions About Iranian Cyber Operations
tenable.comยท3d
๐Ÿ•ต๏ธPenetration Testing
Theories of "Sexuality" in Natural Language Processing Bias Research
arxiv.orgยท1h
๐Ÿ›Digital humanities
AI's Euclid's Elements Moment: From Language Models to Computable Thought
arxiv.orgยท1h
๐Ÿ”ฒCellular Automata
MODEL TRAINING AND EVALUATION
dev.toยท2hยท
Discuss: DEV
๐Ÿ“ŠFeed Optimization
Scattered Spider Taps CFO Credentials in 'Scorched Earth' Attack
darkreading.comยท3d
๐Ÿ”“Hacking
Can We Reliably Predict the Fed's Next Move? A Multi-Modal Approach to U.S. Monetary Policy Forecasting
arxiv.orgยท1h
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap