🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔐 Certificate Analysis

PKI Investigation, SSL/TLS Security, Trust Chains, Cryptographic Validation

Design and Usage of the Human-Machine Interfaces (HMI) for a Land-Based Railway Cyber Range
pixelstech.net·7h
🖥️Modern Terminals
Filter smarter: A better way to investigate fraud with Search
fingerprint.com·2d
🔍BitFunnel
An OCC Idea
lambdacreate.com·1d
🗄️Database Internals
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·2d
💣ZIP Vulnerabilities
No ban planned: Creative Commons is working on licenses for AI training
heise.de·13h
🕵️Vector Smuggling
New DDoS Attack Record – The MSP Cyber News Snapshot – June 26th
heimdalsecurity.com·17h
🔓Hacking
How Geopolitical Tensions Are Shaping Cyber Warfare
darkreading.com·19h
🎯Threat Hunting
Ken Kocienda - Coding With AI using Cursor
kocienda.micro.blog·3h
🔄Language Evolution
Defining Zero Trust for Bring Your Own Cloud (BYOC)
signoz.io·16h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·1d
📄Document Digitization
Kai West, aka IntelBroker, indicted for cyberattacks causing $25M in damages
securityaffairs.com·15h
🎫Kerberos Attacks
AIsecTest & Ψ AISysIndex: A New Frontier in AI Self-Awareness for Security
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Policy Certification and Verification for Cybersecurity in the Internet of Things
labs.ripe.net·4d
🏠Home Automation
SAFE and Trusted: Why the Spectra Assure Community Badge Belongs on Your Open Source Project
reversinglabs.com·21h
🔓Open Source Software
TLSNotary ― Flow Overview
dev.to·3d·
Discuss: DEV
🌐NetworkProtocols
Practical and Accurate Local Edge Differentially Private Graph Algorithms
arxiv.org·5h
🗜️Graph Compression
Critical Security Importance Digital Age Web Techniques(1751002215693700)
dev.to·4h·
Discuss: DEV
🔒WASM Capabilities
Hackers are using fake Zoom apps to steal your data and your cryptowallet - here's how to stay safe
techradar.com·13h
🔓Hacking
TITAN: Query-Token based Domain Adaptive Adversarial Learning
arxiv.org·5h
📊Learned Metrics
Is Your Automated Software Engineer Trustworthy?
arxiv.org·3d
⚡Proof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap