๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

The Digital Rights in Asia-Pacific Assembly (DRAPAC) 2025
accessnow.orgยท1d
๐Ÿ“‹PREMIS Events
Using pprint.saferepr() for string comparisons in Python
chipx86.blogยท15h
โœ…Format Verification
Velociraptor incident response tool abused for remote access
news.sophos.comยท20h
๐Ÿ”“Hacking
Applying AI Analysis to PDF Threats
blog.virustotal.comยท2dยท
Discuss: blog.virustotal.com
๐Ÿ”Binary Forensics
Project Lightning Talks: Closing - Jeffrey Sica, CNCF
youtube.comยท21h
๐ŸŒŠApache Kafka
Accelerating legacy code modernization: EPAMโ€™s journey with Amazon Q Developer
aws.amazon.comยท1d
๐Ÿ”„Reproducible Builds
Proxmox Cluster Mini Rack
i.redd.itยท16hยท
Discuss: r/homelab
๐Ÿ Homelab Clusters
Getting a Better Handle on International Domain Names and Punycode, (Tue, Aug 26th)
isc.sans.eduยท1d
๐Ÿ“กDNS Archaeology
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฑGalois Cryptography
Block unsafe prompts targeting your LLM endpoints with Firewall for AI
blog.cloudflare.comยท1d
๐Ÿ›ก๏ธCLI Security
Auditing Approximate Machine Unlearning for Differentially Private Models
arxiv.orgยท14h
๐Ÿ›ก๏ธDifferential Privacy
InfoSec News Nuggets 8/25/2025
aboutdfir.comยท2d
๐Ÿ”“Hacking
Join the Heroku "Back to School" AI Challenge: $3,000 in Prizes, just for students!
dev.toยท1hยท
Discuss: DEV
๐Ÿ Homelab Federation
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท2d
๐Ÿ›กCybersecurity
Tencent Cloud sites breached to expose valuable data - here's what we know
techradar.comยท2h
๐Ÿ”“Hacking
R0AR Chain Launches Public Node Sale Following $1 Million Whitelist Success
hackernoon.comยท22h
๐Ÿ”—Hash Chains
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.comยท2dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
How a scam hunter got scammed (Lock and Code S06E17)
malwarebytes.comยท2d
๐Ÿฆ Malware Analysis
Backend Challenge: Learn Rust Microservices for the Cloud
dev.toยท4hยท
Discuss: DEV
๐Ÿฆ€Rust Borrowing
LLM Monitoring and Observability: Hands-on with Langfuse
towardsdatascience.comยท1d
๐Ÿ‘๏ธSystem Observability
Loading...Loading more...
AboutBlogChangelogRoadmap