๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”“ Hacking

computer security, crazy vulnerabilities

Security Affairs newsletter Round 529 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท3d
๐Ÿ›ก๏ธeBPF Security
Worth Reading 062425
rule11.techยท3h
๐ŸŒDNS over QUIC
Cambridge Cybercrime Conference 2025 โ€“ Liveblog
lightbluetouchpaper.orgยท3h
๐ŸŽฏThreat Hunting
Security Advisory: Anthropic's Slack MCP Server Vulnerable to Data Exfiltration
embracethered.comยท19hยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.comยท2hยท
Discuss: Substack
๐Ÿš€Indie Hacking
WinRAR exploit enables attackers to run malicious code on your PC โ€” critical vulnerability patched in latest beta update
tomshardware.comยท4h
๐Ÿ’ฃZIP Vulnerabilities
The complexity trap: why cybersecurity must be simplified
techradar.comยท9h
๐Ÿ›กCybersecurity
Suspected China state hackers exploited patched flaw to breach Canadian telecom
arstechnica.comยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
A computer worth 7k$ and the question if it had internet
berti92.github.ioยท4hยท
Discuss: Hacker News
๐Ÿ‡ฉ๐Ÿ‡ชGerman Computers
Malicious Python Package Typosquats Popular passlib Library, Shuts Down Windows Systems
socket.devยท1dยท
Discuss: Hacker News
๐ŸŽฏNTLM Attacks
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesnโ€™t)
blog.elcomsoft.comยท1d
๐Ÿ”“Password Cracking
How to find Aviatrix Controller on your network
runzero.comยท17h
๐Ÿ”คEBCDIC Privacy
Digital Forensics Round-Up, June 25 2025
forensicfocus.comยท4h
๐Ÿ”ฌArchive Forensics
Classic WTF: The Core Launcher
thedailywtf.comยท1d
๐Ÿ•ธ๏ธWASM Archives
Google says hackers used app specific passwords to bypass MFA in a targeted attack
ghacks.netยท2dยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
InfoSec News Nuggets 6/24/2025
aboutdfir.comยท1d
๐Ÿ›กCybersecurity
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comยท1d
๐ŸŽซKerberos Exploitation
This is how you build an AI Ransomware Worm
trufflesecurity.comยท1dยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
The Good, the Bad and the Ugly in Cybersecurity โ€“ Week 25
sentinelone.comยท5d
๐Ÿ›กCybersecurity
XOR Marks the Flaw in SAP GUI
darkreading.comยท5h
๐Ÿ’ฃZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap