🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking

computer security, crazy vulnerabilities

The Case of Hidden Spam Pages
blog.sucuri.net·18h
🌐WARC Forensics
How do CAPTCHAs Work?
corero.com·1d
⚡Proof Automation
Encrypting identifiers in practice
sjoerdlangkemper.nl·1d
🌊Stream Ciphers
CapCut Con: Apple Phishing & Card-Stealing Refund Ruse
cofense.com·9h
🎫Kerberos Attacks
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.com·1d
💣ZIP Vulnerabilities
AI is Hallucinating Package Names - And Hackers Are Ready
dev.to·13h·
Discuss: DEV
🚀Indie Hacking
How Secure Is a Generative AI Voice Bot for Your Operations?
dev.to·5h·
Discuss: DEV
👂Audio Evidence
Why ‘TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.com·1d
🌐Network Security
16 billion passwords from Apple, Facebook, Google and more leaked. Why has no one heard of it?
the-independent.com·1d
🔓Password Cracking
Program Execution, follow-up
windowsir.blogspot.com·1d·
Discuss: www.blogger.com
⚡Performance Tools
Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·3d
🛡️eBPF Security
The collective waste caused by poor documentation
shanrauf.com·1d·
Discuss: Hacker News
📦Deflate
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·1d
🎫Kerberos Exploitation
CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability
dev.to·1d·
Discuss: DEV
🛡Cybersecurity
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·1d·
Discuss: DEV
🔒WASM Capabilities
Rsync Vulnerabilities Open the Door to Remote Exploits
dev.to·3d·
Discuss: DEV
💣ZIP Vulnerabilities
🧠 Solving LeetCode Until I Become Top 1% — Day `31`
dev.to·6h·
Discuss: DEV
🔢Bitwise Algorithms
Who is most at risk from the billions of leaked Facebook and Google passwords?
restofworld.org·1d
🛡Cybersecurity
"CitrixBleed 2": Citrix Netscaler gaps more serious
heise.de·5h
📦Container Security
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap