🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ” Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Issuing TLS Certificates in Go
getpid.devΒ·3dΒ·
Discuss: r/golang
πŸ”CBOR
Paralegal: Practical Static Analysis for Privacy Bugs
cs.brown.eduΒ·1dΒ·
Discuss: Hacker News
πŸ“œProof Carrying Code
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.euΒ·10h
βœ…Archive Validation
Digital Fraud in the Jewellery Business β€” How Hackers Are Misusing Trusted Jewellery Brands?
infosecwriteups.comΒ·9h
🚨Incident Response
Announce: ReactorCA – Simple, centralised CA to fit your internal services with TLS certs
reddit.comΒ·21hΒ·
Discuss: r/homelab
🏠Homelab Security
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.orgΒ·4h
πŸ”“Open Source Software
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beΒ·1d
βš—οΈAlgebraic Coding
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.comΒ·4h
πŸ’ΏDAT Forensics
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comΒ·1d
🦠Malware Analysis
A Methodological Framework for LLM-Based Mining of Software Repositories
arxiv.orgΒ·13h
πŸ”—Topological Sorting
Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being
forensicfocus.comΒ·3h
🚨Incident Response
OWASP ASVS 5.0.0 is here!
scotthelme.ghost.ioΒ·1d
πŸ›‘οΈWASM Sandboxing
Cisco disclosed a CRM data breach via vishing attack
securityaffairs.comΒ·2h
🌐BGP Security
pdfRest Launches New Sign PDF API Tool for Legally Compliant Digital Signatures
pdfa.orgΒ·1d
πŸ“„PDF Archaeology
Cybersecurity Instruction Tuned Model
huggingface.coΒ·15hΒ·
Discuss: Hacker News
πŸ”’WASM Capabilities
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgΒ·2d
πŸ’£ZIP Vulnerabilities
Mobile app analytics library led to the PII exposure
cossacklabs.comΒ·1dΒ·
Discuss: Hacker News
🚨Incident Response
Authentication vs. authorization: What’s the difference?
proton.meΒ·7h
πŸ”Capability Systems
SonicWall investigating possible zero-day related to firewall attacks
cybersecuritydive.comΒ·3h
πŸ”“Hacking
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comΒ·23h
🎫Kerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap