🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

CVE-2025-7775: Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild
tenable.comΒ·15h
🏠Homelab Pentesting
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comΒ·20h
βœ…Format Verification
Google suffers data breach, puts out Gmail warning
proton.meΒ·11hΒ·
Discuss: Hacker News
πŸ”“Hacking
ScreenConnect admins targeted by spear phishing attacks
heise.deΒ·23h
🎫Kerberos Attacks
Fast-Spreading, Complex Phishing Campaign Installs RATs
darkreading.comΒ·1d
πŸ”“Hacking
Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·4dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
VISION: Robust and Interpretable Code Vulnerability Detection Leveraging Counterfactual Augmentation
arxiv.orgΒ·4h
πŸ”Vector Forensics
Canary tokens: Learn all about the unsung heroes of security at Grafana Labs
grafana.comΒ·10hΒ·
Discuss: Hacker News
🏺Kerberos Archaeology
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.aiΒ·13hΒ·
Discuss: Hacker News
πŸ”—Constraint Handling
Learning how MCP works by reading logs – and building MCP Interceptor
thomasgauvin.comΒ·12hΒ·
Discuss: Hacker News
⚑gRPC
Citrix fixed three NetScaler flaws, one of them actively exploited in the wild
securityaffairs.comΒ·12h
🌐DNS Security
Cytonic: Redefining Innovation and Security in Blockchain
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”PKI Archaeology
Convenient 'Copy as cURL': explicit, executable, editable request replays
huonw.github.ioΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈWASM Security
The Science of Intelligent Exploration: Why We Need Exploration in AI
richardcsuwandi.github.ioΒ·3dΒ·
Discuss: Hacker News
πŸ”²Cellular Automata
A Bitcoin Core Code Analysis
binaryigor.comΒ·1dΒ·
Discuss: Hacker News
🧬Bitstream Evolution
To Succeed in Platform Engineering, Build Infrastructure Knowledge Graphs - Safeer C M, MoEngage
youtube.comΒ·11h
πŸ—ΊοΈCompetency Maps
Stability Optimization and Analysis of Energy Flow Networks versus Different Centrality Measurement
arxiv.orgΒ·1d
🀝Consensus Algorithms
Securing the AI Revolution: Introducing Cloudflare MCP Server Portals
blog.cloudflare.comΒ·18hΒ·
Discuss: Hacker News
🌐DNS Security
Thoughts on systems thinking and production excellence from Release It
stevenoxley.comΒ·17hΒ·
Discuss: Hacker News
πŸ›‘οΈError Boundaries
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.orgΒ·1d
🎯Content Recommendation
Loading...Loading more...
AboutBlogChangelogRoadmap