๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

Tencent Cloud sites breached to expose valuable data - here's what we know
techradar.comยท2d
๐Ÿš€Indie Hacking
Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference
cacm.acm.orgยท2d
๐ŸŒNetwork Security
A Complete Guide to Infrastructure as Code Security
boostsecurity.ioยท1d
๐Ÿ Homelab Security
What Happens When Blockchain Becomes Mutable?
hackernoon.comยท1d
๐Ÿ”—Hash Chains
Binary Exploitation 101 - Introduction
r1ru.github.ioยท4d
๐Ÿ“ผCassette Hacking
Cloudy Summarizations of Email Detections: Beta Announcement
blog.cloudflare.comยท1d
๐ŸŽฏThreat Hunting
Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed
circleid.comยท22h
๐Ÿ•ต๏ธVector Smuggling
New research claiming passkeys can be stolen is pure nonsense
arstechnica.comยท2dยท
Discuss: Lobsters, Hacker News, Hacker News
๐ŸบKerberos Archaeology
Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security
blackhillsinfosec.comยท3d
๐Ÿ”“LDAP Injection
How ChatGPT became a confidant and guided a teenager through planning his suicide
the-decoder.comยท3h
โš–๏ธEmulation Ethics
InfoSec News Nuggets 8/26/2025
aboutdfir.comยท4d
๐Ÿ›กCybersecurity
How to find Arcserve Unified Data Protection installations on your network
runzero.comยท1d
๐Ÿ“ฆContainer Security
Chasing the Silver Fox: Cat & Mouse in Kernel Shadows
research.checkpoint.comยท2d
๐Ÿฆ Malware Analysis
Bruteforcing pwgen passwords
blog.sesse.netยท5hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
I Love Reading 1980s Computer Magazines, and So Should You
wired.comยท35mยท
Discuss: Hacker News
๐Ÿ’พvintage computing
Grok's First Vibe-Coding Agent Has a High 'Dishonesty Rate'
pcmag.comยท22hยท
Discuss: r/programming
๐Ÿ’พPersistence Strategies
Citrix forgot to tell you CVE-2025โ€“6543 has been used as a zero day since May 2025
doublepulsar.comยท1dยท
Discuss: Hacker News
๐ŸŒDNS Security
Top 10 hacking Books to Learn Ethical Hacking
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Certificate Analysis
Putin on the code: DoD reportedly relies on utility written by Russian dev
theregister.comยท2dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
The inadequate guide to Rails security
honeybadger.ioยท3d
๐ŸŽฏNTLM Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap