🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

How keys are used in FileVault and encryption
eclecticlight.coΒ·7h
🦠Parasitic Storage
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.orgΒ·1d
πŸ’»Local LLMs
WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·22m
πŸ’£ZIP Vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·9h
🌊Stream Ciphers
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·17hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
From Zero to One: A Complete Guide to Implementing WeChat Sharing in HarmonyOS
dev.toΒ·5hΒ·
Discuss: DEV
⚑Modern Compression
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·7h
πŸ“Concrete Syntax
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·16h
πŸ”—Data Provenance
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devΒ·20hΒ·
Discuss: Hacker News
🎯NTLM Attacks
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comΒ·7h
πŸ“‹Protocol Buffers
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·1h
🦠Malware Analysis
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·1h
πŸ”“Hacking
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·5h
πŸ”NTLM Forensics
Why document-borne malware needs to be back on the radar for organization
techradar.comΒ·1d
πŸ”“Hacking
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·4h
🎫Kerberos Attacks
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chΒ·5h
πŸ—ƒοΈDatabase Storage
The collective waste caused by poor documentation
shanrauf.comΒ·12hΒ·
Discuss: Hacker News
πŸ“¦Deflate
Program Execution, follow-up
windowsir.blogspot.comΒ·1hΒ·
Discuss: www.blogger.com
⚑Performance Tools
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·4h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap