๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›ก Cybersecurity
Speedrun Incident Investigations Across GitHub, AWS, Okta, and More
goteleport.comยท2d
๐ŸšจIncident Response
Supercharging Your Threat Hunts: Join VirusTotal at Labscon for a Workshop on Automation and LLMs
blogger.comยท1d
๐Ÿ Homelab Pentesting
AI can help track an ever-growing body of vulnerabilities, CISA official says
cyberscoop.comยท2d
๐Ÿ”“Hacking
22.00.0127 Tags are dumb. I'm going to fix tags
johnnydecimal.comยท4h
๐Ÿ”Archive Semantics
IT threat evolution in Q2 2025. Non-mobile statistics
securelist.comยท1d
๐ŸŽซKerberos Exploitation
Links 9/5/2025
nakedcapitalism.comยท1d
๐Ÿ•ธ๏ธKnowledge Graphs
Russia targets WhatsApp and pushes new 'super-app' as internet blackouts grow
bbc.co.ukยท19hยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
U.S. CISA adds Sitecore, Android, and Linux flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comยท1d
๐Ÿ”“Hacking
Computer Security: Block ads, stay clean
home.cernยท2dยท
Discuss: Hacker News
๐Ÿ”“Hacking
SQLite Is Open-Source, Not Open-Contribution
sqlite.orgยท12hยท
Discuss: Hacker News
๐Ÿ’พSQLite
Under the Hood of Fuzzy Search: Building a Search Engine 15 times fuzzier than Lucene
andrewjsaid.comยท11hยท
Discuss: Hacker News, r/programming
๐ŸŽฏAutomata theory
Django Unauthenticated, 0 click, RCE, and SQL Injection using default configuration.
infosecwriteups.comยท2d
๐Ÿ”“Hacking
You.com Raises $100M Series C at a $1.5B Valuation
home.you.comยท2dยท
Discuss: Hacker News
๐Ÿด๓ ง๓ ข๓ ณ๓ ฃ๓ ด๓ ฟScottish Computing
Phishing Empire Runs Undetected on Google, Cloudflare
darkreading.comยท2d
๐ŸŽซKerberos Exploitation
Czech Warning Highlights China Stealing User Data
darkreading.comยท2d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
The Salesloft-Drift Breach: Analyzing the Biggest SaaS Breach of 2025
reco.aiยท14hยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Strategies for securing non-human identities (services, workloads, AI agents)
cerbos.devยท1dยท
Discuss: Hacker News, r/programming
๐ŸŽฏThreat Hunting
Rug pulls, forks, and open-source feudalism
lwn.netยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
I have hacked to gather a software stack to take over the world
yetanotherprojecttosavetheworld.orgยท3dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
How Has IoT Security Changed Over the Past 5 Years?
darkreading.comยท1d
๐Ÿ Home Automation
Loading...Loading more...
AboutBlogChangelogRoadmap