🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Breaking the code in network theory: Bimodularity reveals direction of influence in complex systems
phys.orgΒ·3h
🌊Spectral Clustering
Decentralizing AIS: Trustless Maritime Tracking with SDR
rtl-sdr.comΒ·17h
πŸ‘οΈObservatory Systems
Hackers steal data from Salesforce instances in widespread campaign
cybersecuritydive.comΒ·1h
🎫Kerberos Attacks
Research Worth Reading Week 32/2025
pentesterlab.comΒ·1d
πŸ”“Hacking
TypeScript Cookbook β€’ Stefan Baumgartner & Peter KrΓΆner
youtube.comΒ·9h
🎯Gradual Typing
Reloading classes in python and shared borders
andrewpwheeler.comΒ·10hΒ·
Discuss: Hacker News
πŸ¦€Rust Macros
OpenAI: Building the "Everything Platform" in AI
leoniscap.comΒ·1dΒ·
Discuss: Hacker News
πŸ€–AI Curation
Perplexity's AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts
it.slashdot.orgΒ·1d
πŸ”“Hacking
Canary Deployment and Traffic Shifting with Kubernetes and Istio
blog.devops.devΒ·1d
πŸ“‘Network Monitoring
The Hidden Risk of Consumer Devices in the Hybrid Workforce
darkreading.comΒ·7h
🏠Homelab Security
Put a ring on it: a lock-free MPMC ring buffer
h4x0r.orgΒ·6hΒ·
Discuss: Lobsters, Hacker News, r/programming
⚑Hardware Transactional Memory
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ”±Galois Cryptography
Route-and-Execute: Auditable Model-Card Matching and Specialty-Level Deployment
arxiv.orgΒ·17h
πŸ¦‹Format Metamorphosis
Getting a Better Handle on International Domain Names and Punycode, (Tue, Aug 26th)
isc.sans.eduΒ·5h
πŸ“‘DNS Archaeology
CSPs - Part 1: How to (Almost) Always Win at Minesweeper
dev.toΒ·4hΒ·
Discuss: DEV
πŸ”²Cellular Automata
Multigres Architecture Overview
multigres.comΒ·22hΒ·
Discuss: Hacker News
πŸ—„οΈDatabase Sharding
AWS Weekly Roundup: Amazon Aurora 10th anniversary, Amazon EC2 R8 instances, Amazon Bedrock and more (August 25, 2025)
aws.amazon.comΒ·1d
🌊Streaming Systems
I open-sourced a protocol to create auditable logs for AI agents
medium.comΒ·7hΒ·
Discuss: Hacker News
πŸš€Indie Hacking
The Hexagon: A Battle-Tested Blueprint for Your Event-Driven App
mina-tafreshi.medium.comΒ·1hΒ·
Discuss: Hacker News
🌊Streaming Systems
ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing
blog.checkpoint.comΒ·8h
πŸ’£ZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap