🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Understanding Information Gain: Choosing the Right Questions
dev.to·3h·
Discuss: DEV
🧠Machine Learning
Surveillance: Law enforcement agencies are once again using more state trojans
heise.de·7h
🌐WARC Forensics
Exposed Without a Breach: The Cost of Data Blindness
securityaffairs.com·17h
🔓Hacking
How to detect Tor traffic & block high-risk anonymity networks
fingerprint.com·11h
🧅Tor Networks
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.com·17h
🎯Threat Hunting
Ranking the top threats and techniques for the first half of 2025
redcanary.com·15h
🎯Threat Hunting
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.be·1d
⚗️Algebraic Coding
Against the Computer and Its World
illwill.com·25m·
Discuss: Hacker News
🧲Magnetic Philosophy
Risky Bulletin: Russia to designate ERPs as "critical information infrastructure"
news.risky.biz·2h
🏠Homelab Pentesting
Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being
forensicfocus.com·14h
🚨Incident Response
Project AK47: Uncovering a Link to the SharePoint Vulnerability Attacks
unit42.paloaltonetworks.com·5h
🌐DNS Security
Deepfake Forensics Is Much More Than Deepfake Detection!
blog.ampedsoftware.com·14h
💿DAT Forensics
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.com·1d·
Discuss: Hacker News
🔓Hacking
Evading Data Provenance in Deep Neural Networks
arxiv.org·1d
🔍Vector Forensics
Authentication vs. authorization: What’s the difference?
proton.me·17h
🔐Capability Systems
Those Titles the AI Bot Thought I Had Written
bsdly.blogspot.com·21h·
Discuss: bsdly.blogspot.com
🧪Archive Fuzzing
Unexpected snail mail packages are being sent with scammy QR codes, warns FBI
malwarebytes.com·17h
🦠Malware Analysis
Top 10 security threats to K-12 schools
jamf.com·7h
🔓Hacking
US considers tracking AI chips, TSMC fires employees over the theft of advanced technology
the-decoder.com·16h
🔬Hardware Forensics
Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.com·14h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap