🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 DNS Security

Cache Poisoning, DNSSEC Implementation, Protocol Vulnerabilities, Name Resolution

Speedrun Incident Investigations Across GitHub, AWS, Okta, and More
goteleport.comΒ·2d
🚨Incident Response
Researchers find alarming overlaps among 18 popular VPNs
engadget.comΒ·2d
🌐DNS over QUIC
Vulnerability Disclosure: Stealing Emails via Prompt Injections
insinuator.netΒ·4d
πŸ“‘Feed Security
Career Leverage as a Developer
mooreds.comΒ·5hΒ·
Discuss: Hacker News
πŸ”Capability Security
Amazon CloudFront now supports IPv6 origins for end-to-end IPv6 delivery
aws.amazon.comΒ·1dΒ·
Discuss: Hacker News
🌐Network Protocols
Interrupts – The Heartbeat of a Unix Kernel
leftasexercise.comΒ·2dΒ·
Discuss: Hacker News
πŸ–₯️Modern Terminals
Show HN: I built a tool that turns cryptography papers into working Python code
paperstoapp.comΒ·2dΒ·
Discuss: Hacker News
πŸ”—Hash Chains
Debian 13.1 Released with Security Fixes and Stability Updates
linuxiac.comΒ·13h
πŸ“¦Package Managers
Hello Cybersecurity World! My Journey into Ethical HackingπŸ‘‹
dev.toΒ·3dΒ·
Discuss: DEV
πŸ›‘Cybersecurity
Anti AI/LLM scraper bot firewall
github.comΒ·10hΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Safe Sharing of Fast Kernel-Bypass I/O Among Nontrusting Applications
arxiv.orgΒ·2d
πŸ”eBPF
The maths you need to start understanding LLMs
dev.toΒ·14hΒ·
Discuss: DEV
πŸ’»Local LLMs
Beyond .com: How Unstoppable Domains and 0G Labs are Crafting a Naming System for the AI Revolution
hackernoon.comΒ·4d
πŸ“‘DNS Archaeology
Extracting Structured Data with LangExtract: A Deep Dive into LLM-Orchestrated Workflows
towardsdatascience.comΒ·13h
πŸ€–Archive Automation
go-yaml/yaml has been forked into yaml/go-yaml
github.comΒ·1dΒ·
Discuss: r/golang
πŸ”’Linear Types
Hybrid AI-Driven Intrusion Detection: Framework Leveraging Novel Feature Selection for Enhanced Network Security
arxiv.orgΒ·3d
🎯Threat Hunting
Anyone Using Agentic AI Needs to Understand Toxic Flows
darkreading.comΒ·1d
🎯Threat Hunting
Parameters and binding forms should be mutually recursive
samestep.comΒ·1dΒ·
Discuss: Hacker News
πŸ”—Concatenative Programming
OSINT β€” A Beginner’s Guide to Open Source Intelligence.
infosecwriteups.comΒ·21h
πŸ”ŽOSINT Techniques
Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data
arxiv.orgΒ·3d
πŸ›‘οΈDifferential Privacy
Loading...Loading more...
AboutBlogChangelogRoadmap