🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💣 Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

Guest checkout fraud: How to stop repeat offenders
fingerprint.com·4h
🎫Kerberos Attacks
Mixed nuts #15
brycewray.com·1d
📰RSS Reading Practices
Protecting Science: TIB Builds Dark Archive for ArXiv
blog.tib.eu·16h·
Discuss: Hacker News
📚MARC Records
Ken Kocienda - Coding With AI using Cursor
kocienda.micro.blog·16h
🔄Language Evolution
How to Fix Your Context
dbreunig.com·1d·
Discuss: Hacker News
✨Effect Handlers
What Is CIFS and How Does It Impact Enterprise File System Security?
securityscorecard.com·3d
💿ZFS Internals
Breaking Limits: Highly-Isolated and Low-Overhead Wasm Container - Soichiro Ueda & Ai Nozaki
youtube.com·1d
⚙️WASM Runtime
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.com·2d·
Discuss: Hacker News
📲Digitization
APT42 impersonates cyber professionals to phish Israeli academics and journalists
securityaffairs.com·15h
🎫Kerberos Attacks
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·1d
📄Document Digitization
Machine Learning Fundamentals: adam optimizer tutorial
dev.to·7h·
Discuss: DEV
📊Feed Optimization
SSO Security Exposed: Real-World Attack Scenarios in 2025
dev.to·3h·
Discuss: DEV
🎫Kerberos Attacks
MMSearch-R1: Incentivizing LMMs to Search
arxiv.org·1d
🔍BitFunnel
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.com·2d
🎫Kerberos Exploitation
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750952117902400)
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Small Encoders Can Rival Large Decoders in Detecting Groundedness
arxiv.org·18h
🧮Kolmogorov Complexity
Decoding the Human Language: An Introduction to Natural Language Processing (NLP) Fundamentals
dev.to·16h·
Discuss: DEV
📝Text Parsing
From Codicology to Code: A Comparative Study of Transformer and YOLO-based Detectors for Layout Analysis in Historical Documents
arxiv.org·1d
📃Manuscript Tokenization
Kafka Fundamentals: kafka retention.ms
dev.to·2d·
Discuss: DEV
🌊Streaming Systems
CBF-AFA: Chunk-Based Multi-SSL Fusion for Automatic Fluency Assessment
arxiv.org·1d
🎙️Whisper
Loading...Loading more...
AboutBlogChangelogRoadmap