🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🚨 Incident Response

Digital Forensics, Log Analysis, Timeline Reconstruction, Evidence Collection

Minister admits domestic abuse screening tool doesn't work
bbc.com·21h
🎯Threat Hunting
Elon Musk sues Apple and OpenAI, accusing them of anticompetitive practices
lemonde.fr·1d
👂Audio Evidence
Not So Prompt: Prompt Optimization as Model Selection
gojiberries.io·3d·
Discuss: Hacker News
⚙️Compression Benchmarking
Build an AI Agent with LangGraph
spin.atomicobject.com·15h·
Discuss: Hacker News
🤖AI Curation
Police arrest LA burglary crew suspected in nearly 100 break-ins
the-independent.com·1d
🎯Threat Hunting
Thoughts on systems thinking and production excellence from Release It
stevenoxley.com·12h·
Discuss: Hacker News
🛡️Error Boundaries
How Smart Aluminum Fences Are Transforming Business Security
dev.to·1d·
Discuss: DEV
🏠Home Automation
🚀 New Series on Data Engineering Tools & Platforms
dev.to·2d·
Discuss: DEV
🌊Stream Processing
Cyber resilience in the post-quantum era: the time of crypto-agility
techradar.com·1d
🔐Quantum Security
TOMATO: Assessing Visual Temporal Reasoning Capabilities in Multimodal Foundation Models
arxiv.org·23h
🤖Advanced OCR
California parents charged with murder of missing 7-month-old son
mercurynews.com·8h
⚖️Digital Evidence
A Feminist Account of Intersectional Algorithmic Fairness
arxiv.org·23h
🌍Cultural Algorithms
Improving Performance, Robustness, and Fairness of Radiographic AI Models with Finely-Controllable Synthetic Data
arxiv.org·23h
🏺Computational Archaeology
HV Metric For Time-Domain Full Waveform Inversion
arxiv.org·23h
📊Rate-Distortion Theory
Analysis and Detection of RIS-based Spoofing in Integrated Sensing and Communication (ISAC)
arxiv.org·23h
⚖️RISC-V Formal
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blog·1d·
Discuss: Hacker News
⚡Proof Automation
Bringing Cloudflare’s AI to FedRAMP High
blog.cloudflare.com·1d
🌊Stream Processing
I Rebuilt the Ergast F1 Database with Live Data (and Here's What I Learned)
dev.to·17h·
Discuss: DEV
🌊Streaming Systems
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.com·5d
🕵️Penetration Testing
Show HN: Web2mcp – Auto-generate an MCP for any web app
github.com·34m·
Discuss: Hacker News
⚡gRPC
Loading...Loading more...
AboutBlogChangelogRoadmap