🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’£ Compression Security

ZIP Bombs, Decompression Attacks, Archive Vulnerabilities, Format Exploitation

French counter-espionage memo alerts defense companies on spying by Russia
france24.comΒ·2h
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
The bad news: AI is going pretty much as I expected
garymarcus.substack.comΒ·16hΒ·
Discuss: Substack
🏴󠁧󠁒󠁳󠁣󠁴󠁿Scottish Computing
Saving the Irish Maths Olympiad
thefitzwilliam.comΒ·20hΒ·
Discuss: Hacker News
πŸ‘‘Isabelle
Chinese cyberattacks keep hitting the US. They may have stolen personal information from you and every other American
the-independent.comΒ·1d
πŸ›‘Cybersecurity
What I learned managing an AI developer while seeking enlightenment
pocha.substack.comΒ·22hΒ·
Discuss: Substack
πŸŒ€Brotli Internals
Cogent Communications Holdings, Inc. (CCOI) Presents At Bank Of America 2025 Media, Communications & Entertainment Conference Transcript
seekingalpha.comΒ·1d
πŸ“‹Format Specification
Generative AI as a Cybercrime Assistant
schneier.comΒ·2dΒ·
Discuss: Hacker News
πŸ”Vector Forensics
WHY TWITTER VIDEO DOWNLOADS MATTER IN 2025
dev.toΒ·3dΒ·
Discuss: DEV
πŸŽ₯Streaming Codecs
Deploying A Dockerized Golang App To AWS App Runner
dev.toΒ·12hΒ·
Discuss: DEV
πŸ”„Sync Engine
Why Chainguard Is Doubling Down on Virtual Machines in a Container World
thenewstack.ioΒ·16h
πŸ“¦Container Security
Top 10 Cybersecurity Companies in Europe
heimdalsecurity.comΒ·3d
πŸ›‘Cybersecurity
Secure Rust development with GitLab
about.gitlab.comΒ·4d
πŸ¦€Rust Borrowing
The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks
dev.toΒ·3dΒ·
Discuss: DEV
πŸ•΅οΈVector Smuggling
For 2 years my api testing was a mess of go scripts. so I merged them into 'apter', a single binary tool.
reddit.comΒ·1dΒ·
Discuss: r/golang
❄️Nix Flakes
Speech DF Arena: A Leaderboard for Speech DeepFake Detection Models
arxiv.orgΒ·2d
πŸ”FLAC Forensics
How Crypto Assets Bootstrap Their Way to Billions
hackernoon.comΒ·3d
πŸ”—Hash Chains
Easier Painting Than Thinking: Can Text-to-Image Models Set the Stage, but Not Direct the Play?
arxiv.orgΒ·2d
πŸ›Digital humanities
Hackers Are Sophisticated & Impatient β€” That Can Be Good
darkreading.comΒ·3d
πŸ”“Hacking
Hyper-Precision Degradation Mapping of *Serpula lacrymans* Using Multi-Spectral Hyperspectral Microscopy and Deep Learning
dev.toΒ·2dΒ·
Discuss: DEV
🏺Computational Archaeology
Meta-Policy Reflexion: Reusable Reflective Memory and Rule Admissibility for Resource-Efficient LLM Agent
arxiv.orgΒ·1d
πŸ“Linear Logic
Loading...Loading more...
AboutBlogChangelogRoadmap