🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡 Cybersecurity
Takedown Notices for Pirate Live Streams Skyrocket, But Why?
torrentfreak.com·16m
🏴‍☠️Piracy
Worth Reading 090925
rule11.tech·1d
🧅Tor Networks
Collaborator Everywhere v2
blog.compass-security.com·2d
🌐NetworkProtocols
Mullvad: QUIC Obfuscation for WireGuard
mullvad.net·1d·
Discuss: Hacker News
🔐Privacy Codecs
Richard Feynman – There's Plenty of Room at the Bottom
muonray.blogspot.com·2h·
Discuss: Hacker News
🌡️Preservation Physics
How to Prove False Statements: Practical Attacks on Fiat-Shamir
eprint.iacr.org·1d·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
We Hacked Burger King: How Auth Bypass Led to Drive-Thru Audio Surveillance
bobdahacker.com·4d·
Discuss: Hacker News
🏺Kerberos Archaeology
Tell-Tale Watermarks for Explanatory Reasoning in Synthetic Media Forensics
arxiv.org·2d
🔍Vector Forensics
Hackers Hijack npm Packages With 2 Billion Weekly Downloads in Supply Chain Attack
it.slashdot.org·2d
🎫Kerberos Attacks
Getting Started with HTTP/3 in Python
dev.to·23h·
Discuss: DEV
🌐Network Protocols
Impersonating Google App Script projects for stealthy persistence
exaforce.com·16h·
Discuss: Hacker News
🚀Indie Hacking
Shaping the Future of Cyber Risk Management: QSC Evolves to ROCon
blog.qualys.com·2d
🔐CBOR
Inside the Man vs. Machine Hackathon
wired.com·1d
🚀Indie Hacking
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
tenable.com·5d
🌐Network Security
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
tenable.com·2d
🔐Archive Encryption
More packages poisoned in npm attack, but would-be crypto thieves left pocket change
theregister.com·1d
💣ZIP Vulnerabilities
Plex users: Reset your password!
malwarebytes.com·1d
🔓Password Cracking
The Protocol Genome A Self Supervised Learning Framework from DICOM Headers
arxiv.org·1d
🧠Machine Learning
How I Log ESPHome Device Data to CSV with Python (and Why You Should Too)
dev.to·2h·
Discuss: DEV
📲syncthing
Trump’s FCC Just Used A Fake ‘Investigation’ To Shower AT&T And Elon Musk With Billions In Valuable Spectrum
techdirt.com·21h
📊PCAP Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap