🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 BGP Security

Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Turkish police seize jewels and antiques worth $30M in raid at Istanbul's historic Grand Bazaar
the-independent.comΒ·9h
🎡Audio Archaeology
We drilled deep under the sea to learn more about mega-earthquakes and tsunamis
phys.orgΒ·5h
πŸ—οΈPaleocryptography
ELA-1504-1 unbound1.9 security update
freexian.comΒ·3d
🌐DNS Security
Hold the High Ground: Cyber Terrain and Strategic Advantage
the-independent.comΒ·6h
πŸ”Capability Systems
Perplexity's AI Browser Comet Vulnerable To Prompt Injection Attacks That Hijack User Accounts
it.slashdot.orgΒ·2d
πŸ”“Hacking
LaLiga Threatens Cloudflare Customer For Using an IP Address Linked to Piracy
torrentfreak.comΒ·1dΒ·
Discuss: Hacker News, r/Piracy
πŸ΄β€β˜ οΈPiracy
Learning Perl in one day and the importance of building strong foundations
guilhermenl.devΒ·9hΒ·
Discuss: Hacker News
πŸ”—Concatenative Programming
Polish Presidential Veto Threatens Starlink Continuity in Ukraine
circleid.comΒ·6h
πŸ‡΅πŸ‡±Elwro Systems
Legitimate Chrome VPN extension turns to browser spyware
infosecurity-magazine.comΒ·3dΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Building your own CLI Coding Agent with Pydantic-AI
martinfowler.comΒ·9h
⚑Proof Automation
Spoon-Bending, a logical framework for analyzing GPT-5 alignment behavior
github.comΒ·2dΒ·
Discuss: Hacker News
πŸ’ΎBinary Linguistics
Ask HN: How do you deal with the fear of installing potentially risky tools?
news.ycombinator.comΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈCLI Security
Protocols, Not Platforms: A Technological Approach to Free Speech (2019)
knightcolumbia.orgΒ·18hΒ·
Discuss: Hacker News
πŸ“‘Feed Archaeology
Proving You Are You, Again and Again
dev.toΒ·5hΒ·
Discuss: DEV
πŸ”PKI Archaeology
Extreme armour in the world’s oldest ankylosaur
nature.comΒ·5h
🦴Binary Paleontology
RomCom and TransferLoader IoCs in the Spotlight
circleid.comΒ·2d
πŸ“‘DNS Archaeology
**High-Performance Packet Processing: Combining eBPF, XDP, and Go for Million-Packet-Per-Second Throughput**
dev.toΒ·2dΒ·
Discuss: DEV
πŸ›‘οΈeBPF Programs
ScreenConnect admins targeted by spear phishing attacks
heise.deΒ·1d
🎫Kerberos Attacks
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.comΒ·2d
🎯Threat Hunting
Cephalus ransomware abuses SentinelOne executable for DLL sideloading
scworld.comΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap