🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

Potential Cyberattack Scrambles Columbia University Computer Systems
nytimes.com·1h
🛡Cybersecurity
Encrypting identifiers in practice
sjoerdlangkemper.nl·17h
🌊Stream Ciphers
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
This is how you build an AI Ransomware Worm
trufflesecurity.com·2d·
Discuss: Hacker News
🕵️Vector Smuggling
Millions of Brother Printers Hit by Critical, Unpatchable Bug
darkreading.com·3h
💣ZIP Vulnerabilities
The Good, the Bad and the Ugly in Cybersecurity – Week 25
sentinelone.com·5d
🛡Cybersecurity
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·14h
🦠Malware Analysis
This Week in Security: That Time I Caused a 9.5 CVE, iOS Spyware, and The Day the Internet Went Down
hackaday.com·5d
🛡️WASM Sandboxing
Your passwords have probably been stolen and sold on the dark web
newscientist.com·5d
🔓Password Cracking
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.com·15h
💣ZIP Vulnerabilities
We’re Running Hai Insight Agent on Our Own Bug Bounty Program – See it in Action
hackerone.com·1d
🕵️Penetration Testing
Butian Platform: Forging China's Next Generation of White Hat Hackers
nattothoughts.substack.com·2h·
Discuss: Substack
🕵️Penetration Testing
XOR Marks the Flaw in SAP GUI
darkreading.com·9h
💣ZIP Vulnerabilities
Show HN: Laburity – Dark and Deep Web Monitoring
laburity.com·1d·
Discuss: Hacker News
🔍NTLM Forensics
The ‘16 billion password breach’ story is a farce
cyberscoop.com·1d·
Discuss: Hacker News
🕳️Information Leakage
CVE-2021-44026: Roundcube Webmail SQL Injection Vulnerability
dev.to·1d·
Discuss: DEV
🚀Indie Hacking
Unsupervised Learning NO. 486
newsletter.danielmiessler.com·2d
🕵️Vector Smuggling
C++ Seeding Surprises (2015)
pcg-random.org·6h·
Discuss: Hacker News
🔢Bitwise Algorithms
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·9h
🦠Malware Analysis
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·14h
📦Content Addressable
Loading...Loading more...
AboutBlogChangelogRoadmap