🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

How keys are used in FileVault and encryption
eclecticlight.coΒ·15hΒ·
Discuss: Lobsters, Hacker News
🦠Parasitic Storage
CodeMorph: Mitigating Data Leakage in Large Language Model Assessment
arxiv.orgΒ·1d
πŸ’»Local LLMs
WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·8h
πŸ’£ZIP Vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nlΒ·17h
🌊Stream Ciphers
From Zero to One: A Complete Guide to Implementing WeChat Sharing in HarmonyOS
dev.toΒ·13hΒ·
Discuss: DEV
⚑Modern Compression
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
davidchisnall/igk: I got Knuth'd: A compiler for documents
github.comΒ·16h
πŸ“Concrete Syntax
The collective waste caused by poor documentation
shanrauf.comΒ·20hΒ·
Discuss: Hacker News
πŸ“¦Deflate
Why document-borne malware needs to be back on the radar for organization
techradar.comΒ·1d
πŸ”“Hacking
How to Prove That An Email Was Received
metaspike.comΒ·2h
πŸ“„Document Digitization
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comΒ·15h
πŸ“‹Protocol Buffers
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·10h
🦠Malware Analysis
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.comΒ·1d
πŸ”—Data Provenance
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.comΒ·15h
πŸ’£ZIP Vulnerabilities
XOR Marks the Flaw in SAP GUI
darkreading.comΒ·9h
πŸ”“Hacking
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·14h
πŸ”NTLM Forensics
Introduction to the Fundamentals of Amazon Redshift
redshift-observatory.chΒ·13h
πŸ—ƒοΈDatabase Storage
Portable Network Graphics (PNG) Specification (Third Edition)
w3.orgΒ·1dΒ·
Discuss: Hacker News
πŸ•ΈοΈWebP Analysis
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·13h
🎫Kerberos Attacks
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devΒ·1dΒ·
Discuss: Hacker News
🎯NTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap