๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

RFC 7711 - PKIX over Secure HTTP (POSH)
datatracker.ietf.orgยท3d
๐ŸŒDNS Security
Digital Forensics Round-Up, July 16 2025
forensicfocus.comยท21h
๐ŸšจIncident Response
Detection Engineering: Practicing Detection-as-Code โ€“ Repository โ€“ Part 2
blog.nviso.euยท4h
๐Ÿ”„Reproducible Builds
Signed and stealing: uncovering new insights on Odyssey infostealer
jamf.comยท22h
๐Ÿ”“Password Cracking
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.orgยท8h
๐Ÿ•ต๏ธVector Smuggling
Legal Ransomware
aardvark.co.nzยท19h
๐Ÿดโ€โ˜ ๏ธPiracy
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
securityaffairs.comยท4h
๐Ÿฆ Malware Analysis
WiSec 2025 Spotlight: Security in the Inaudible World
esat.kuleuven.beยท22h
๐Ÿ“กBluetooth Archaeology
Courts Favor Targeted eDiscovery Collections, but It Is Up to In-House Teams to Enable Such Cost Saving Proportional Efforts
blog.x1discovery.comยท1d
โš–๏ธLegal Compliance
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
lmgsecurity.comยท13h
๐Ÿ”Cryptographic Archaeology
A Wide Reduction Trick (2022)
words.filippo.ioยท9hยท
Discuss: Lobsters, Hacker News
๐ŸŒณArchive Merkle Trees
Another critical vulnerability in Cisco's ISE
heise.deยท3h
๐Ÿ”“Hacking
NEWS ROUNDUP โ€“ 17th July 2025
digitalforensicsmagazine.comยท41m
๐ŸšจIncident Response
Navigating Network Measurements - IPs, ASes, Exhaustion
labs.ripe.netยท23m
๐Ÿ“กNetwork Monitoring
GhostContainer backdoor: malware compromising Exchange servers of high-value organizations in Asia
securelist.comยท4h
๐ŸŒDNS Security
Software Security Imperative: Forging a Unified Standard of Care
thenewstack.ioยท1d
๐Ÿ›กCybersecurity
How to actually use Model Context Protocol
seangoedecke.comยท12h
โšกProof Automation
Opening a Six-Lock Safe With One Key Using Brunnian Links
hackaday.comยท13h
๐Ÿ”“Password Cracking
Why You Should Care About Vendors Using AI Products, and How Bitsight Helps You Find Out
bitsight.comยท9m
๐Ÿ”—Supply Chain
Trace Every Identity Action with Teleport Identity Security
goteleport.comยท2d
๐Ÿ”—Data Provenance
Loading...Loading more...
AboutBlogChangelogRoadmap