🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

How keys are used in FileVault and encryption
eclecticlight.coΒ·10hΒ·
Discuss: Lobsters, Hacker News
🦠Parasitic Storage
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.orgΒ·1d
πŸ’»Local LLMs
WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·3h
πŸ’£ZIP Vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·11h
🌊Stream Ciphers
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
From Zero to One: A Complete Guide to Implementing WeChat Sharing in HarmonyOS
dev.toΒ·8hΒ·
Discuss: DEV
⚑Modern Compression
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·10h
πŸ“Concrete Syntax
The collective waste caused by poor documentation
shanrauf.comΒ·15hΒ·
Discuss: Hacker News
πŸ“¦Deflate
Why document-borne malware needs to be back on the radar for organization
techradar.comΒ·1d
πŸ”“Hacking
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comΒ·9h
πŸ“‹Protocol Buffers
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·4h
🦠Malware Analysis
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·19h
πŸ”—Data Provenance
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·3h
πŸ”“Hacking
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·8h
πŸ”NTLM Forensics
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·7h
🎫Kerberos Attacks
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chΒ·8h
πŸ—ƒοΈDatabase Storage
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·20hΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devΒ·23hΒ·
Discuss: Hacker News
🎯NTLM Attacks
Program Execution, follow-up
windowsir.blogspot.comΒ·4hΒ·
Discuss: www.blogger.com
⚑Performance Tools
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·6h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap