🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📼 Cassette Hacking

Tape Modification, Audio Exploitation, Sequential Attacks, Magnetic Security

Encrypting data at rest, one OS at a time
tailscale.com·2d
🌊Stream Ciphers
If only I'd known ... Debian repo signing
jpmens.net·1d
❄️Nixpkgs
FUSE Passthrough
docs.kernel.org·1d·
Discuss: Hacker News
🛡️eBPF Security
Newly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware — zero day hack requires manual update to fix
tomshardware.com·4d·
Discuss: r/technews
💣ZIP Vulnerabilities
Technoblogy – A NeoPixel Driver Using AVR Hardware
technoblogy.com·1d·
Discuss: Hacker News
⚡Circuit Design
Fabricated data in posts.xml for multiple/all data dumps
meta.stackexchange.com·2d·
Discuss: Hacker News
📰RSS Archaeology
Practical Diff Testing of Stateful Applications (VLDB'25)
muratbuffalo.blogspot.com·1d·
Discuss: Hacker News
🔄Reproducible Builds
The US Court Records System Has Been Hacked
wired.com·5d
🔓Hacking
6 Things I Learned While Building an Incident Response Simulation (IR Sim 101)
infosecwriteups.com·3d
🎯Threat Hunting
August 14, 2025: Intermediate Scraping Webinar (4 hour) [Americas / Europe-friendly time]
bellingcat.com·1d
⚙️Proof Engineering
Zero-shot self-supervised learning of single breath-hold magnetic resonance cholangiopancreatography (MRCP) reconstruction
arxiv.org·22h
🧠Machine Learning
Multi-Modal Input Fusion and Bayesian Hierarchical Clustering for Dynamic Financial Risk Assessment
dev.to·11h·
Discuss: DEV
🧠Intelligence Compression
Patchday Adobe: Malicious code gaps threaten InDesign, Photoshop & Co.
heise.de·17h
💣ZIP Vulnerabilities
PYNQ-Z2 Music Visualizer
hackster.io·2d
⚡Homebrew CPUs
Levarging Learning Bias for Noisy Anomaly Detection
arxiv.org·2d
🧠Machine Learning
SAEMark: Multi-bit LLM Watermarking with Inference-Time Scaling
arxiv.org·2d
⚙️Compression Benchmarking
MCP Elicitation: Human-in-the-Loop for MCP Servers
dev.to·8h·
Discuss: DEV
⚡gRPC
Evaluating Imputation Techniques for Short-Term Gaps in Heart Rate Data
arxiv.org·1d
📊Count-Min Sketch
Automated Anomaly Detection in Cloud Resource Configuration Utilizing Dynamic Graph Embeddings
dev.to·1d·
Discuss: DEV
🔍Vector Forensics
UK immigration system targeted by hackers - dangerous new phishing campaign hits Sponsorship Management System
techradar.com·15h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap