🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”“ Hacking

computer security, crazy vulnerabilities

How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two)
blog.checkpoint.comΒ·1d
πŸ•ΈοΈMesh Networking
A developer focused on stopping AI bots says poisoning datasets is like peeing in the ocean
the-decoder.comΒ·1d
πŸš€Indie Hacking
NEWS ROUNDUP – 8th July 2024
digitalforensicsmagazine.comΒ·20h
🚨Incident Response
The REM-arkable Misadventures of LIST
masswerk.atΒ·1dΒ·
Discuss: Hacker News
πŸ“ΊVT100
A few interesting and notable ssh/telnet usernames, (Sun, Jul 6th)
isc.sans.eduΒ·2d
🎯NTLM Attacks
PIC Burnout: Dumping Protected OTP Memory in Microchip PIC MCUs
hackaday.comΒ·2h
πŸ’ΎFloppy Imaging
Italian authorities arrest Chinese man over Microsoft Exchange Server hack, targeting of COVID-19 researchers
cyberscoop.comΒ·17hΒ·
Discuss: r/InternationalNews
πŸ‡¨πŸ‡³Chinese Computing
About Signal: Unknown person impersonated US Secretary of State thanks to AI
heise.deΒ·5h
πŸ•΅οΈVector Smuggling
Double extortion possible: cyber criminals in a clinch
heise.deΒ·1d
🎫Kerberos Exploitation
Iranian ransomware crew reemerges, promises big bucks for attacks on US or Israel
theregister.comΒ·7h
🎫Kerberos Attacks
One of the biggest security threats to Apple systems just got a major upgrade - here's what we know
techradar.comΒ·1d
πŸ’ΏWORM Storage
Here’s what I learned after solving 5 Path Traversal Labs.
infosecwriteups.comΒ·1d
🌐DNS Security
Activision took down Call of Duty game after PC players hacked, says source
techcrunch.comΒ·18h
πŸ›‘Cybersecurity
Modern Electric Vehicle Infrastructure Security
ocpp.usΒ·1dΒ·
Discuss: Hacker News
πŸ“»Homebrew Protocols
Suspected Hacker Linked to Silk Typhoon Arrested in Milan
darkreading.comΒ·18h
πŸ‡¨πŸ‡³Chinese Computing
A Dream for 90s.dev
90s.devΒ·1dΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Grinding down open source maintainers with AI
shkspr.mobiΒ·2dΒ·
Discuss: Hacker News, shkspr.mobi
πŸš€Indie Hacking
On Jailbreaking Quantized Language Models Through Fault Injection Attacks
arxiv.orgΒ·1d
πŸ”§Binary Parsers
How to Approach Finding Bugs Easily: My Bug Hunting Methodology
infosecwriteups.comΒ·1d
🦠Malware Analysis
Jobs for IT security experts: vocational training is becoming more attractive
heise.deΒ·39m
πŸ”Capability Systems
Loading...Loading more...
AboutBlogChangelogRoadmap