๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ DNS Security

Cache Poisoning, DNSSEC Implementation, Protocol Vulnerabilities, Name Resolution

Research Worth Reading Week 36/2025
pentesterlab.comยท2d
๐Ÿ”—Hash Chains
When Kernel Comments Get Weird: The Tale of `drivers/char/mem.c`
elisa.techยท2d
๐Ÿ”eBPF
Control and Monetize Your Content with the RSL Standard
fastly.comยท21h
๐Ÿ“ฐRSS Archaeology
Google Cloud enables free switching to other providers in the EU
heise.deยท1h
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Zero-knowledge proofs unlock privacy in digital identity
hopae.comยท2dยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Hnfm: Building a local-first AI podcast generator for Hacker News
briancaffey.github.ioยท17hยท
Discuss: Hacker News
๐Ÿ“กRSS Automation
Weโ€™re Walling Off The Open Internet To Stop AIโ€”And It May End Up Breaking Everything Else
techdirt.comยท2dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes
welivesecurity.comยท6d
๐ŸŽซKerberos Exploitation
The Little Book of Everything
github.comยท2dยท
Discuss: Hacker News
ฮปLambda Formalization
A Humble Blog Post
nvegater.comยท3dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
HALT-RAG: A Task-Adaptable Framework for Hallucination Detection with Calibrated NLI Ensembles and Abstention
arxiv.orgยท17h
๐ŸŒ€Brotli Internals
Huge NPM Supply-Chain Attack Goes Out With Whimper
darkreading.comยท1d
๐Ÿ”“Hacking
Yes, Python is Slow, but it doesnโ€™t matter for AI SaaS
dev.toยท3hยท
Discuss: DEV
๐ŸŒŠStream Processing
I Finally Stopped Alt-Tabbing to ChatGPT While Coding
dev.toยท1dยท
Discuss: DEV
๐ŸชŸAwesome windows command-line
TryQuiet/quiet
github.comยท2d
๐ŸŒWebRTC Archives
Hackers hijack NPM packages with 2B weekly downloads in supply chain attack
bleepingcomputer.comยท2dยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
reDB: Go-Powered Open Source Data Mesh for Real-Time DB Interoperability
reddit.comยท1dยท
Discuss: r/golang
๐Ÿ”€CRDT
From Protest to Power Plant: Interpreting the Role of Escalatory Hacktivism in Cyber Conflict
arxiv.orgยท2d
๐ŸŒBGP Security
Mind the Gap: Evaluating Model- and Agentic-Level Vulnerabilities in LLMs with Action Graphs
arxiv.orgยท2d
โš™๏ธTLA+
NEWS ROUNDUP โ€“ 6th September 2025
digitalforensicsmagazine.comยท4d
๐ŸšจIncident Response
Loading...Loading more...
AboutBlogChangelogRoadmap