🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Checksum Validation

SHA-256, MD5, Data Integrity, Error Detection

Stop Exposing Your Data: How to Pack IDs, UUIDs, and More with Obfusbit
dev.to·23h·
Discuss: DEV
💣Compression Security
Uncovering memory corruption in NVIDIA Triton (as a new hire)
blog.trailofbits.com·7h·
Discuss: Hacker News
🧪Binary Fuzzing
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.eu·11h
✅Archive Validation
Making of SARE: Master Seeds in Hybrid Post-Quantum Encryption
zola.ink·7h·
Discuss: Hacker News
🌳Archive Merkle Trees
Audit the Deployment, Not Just the Code
blog.verichains.io·8h
🎫Kerberos Attacks
OWASP ASVS 5.0.0 is here!
scotthelme.ghost.io·1d
🛡️WASM Sandboxing
Experimental Evaluation of Post-Quantum Homomorphic Encryption for Privacy-Preserving V2X Communication
arxiv.org·14h
🔐Homomorphic Encryption
Unexpected snail mail packages are being sent with scammy QR codes, warns FBI
malwarebytes.com·7h
🦠Malware Analysis
ESP32 Bus Pirate open-source firmware works on off-the-shelf hardware
cnx-software.com·7h
🔌Single Board PC
Schizophrenic Zip Files
blog.isec.pl·7h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.org·4h
🔓Open Source Software
SAML Shield: Drop-in protection that works for any stack
samlshield.com·2h·
Discuss: Hacker News
🛡️WASM Security
The Coming Wave: Post-Quantum Cryptography and the Future of Cybersecurity
blog.publiccomps.com·16h·
Discuss: Hacker News
🔐Quantum Security
Akira Ransomware Exploits SonicWall SMA100 Vulnerabilities: What You Need to Know
bitsight.com·30s
🌐DNS Security
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·5h
💿DAT Forensics
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.com·1d
🦠Malware Analysis
How the Lean language brings math to coding and coding to math
amazon.science·24m·
Discuss: Hacker News
🔬Lean
Exposed Without a Breach: The Cost of Data Blindness
securityaffairs.com·7h
🔓Hacking
Base58Check encoding in Python
johndcook.com·5d
🔤Character Encoding
Loading...Loading more...
AboutBlogChangelogRoadmap