🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Literature Review of the Effect of Quantum Computing on Cryptocurrencies using Blockchain Technology
arxiv.org·5h
🔐Quantum Security
Tempest-LoRa: Cross-Technology Covert Communication
github.com·1d·
Discuss: Hacker News
📻Homebrew Protocols
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·19h
🛡Cybersecurity
A neat idea, but I can see this leading to the Balkanization of the Internet
boston.conman.org·7h
🛡Cybersecurity
How Deep Research Agents Can Leak Your Data
embracethered.com·1d
🧪Protocol Fuzzing
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·21h
🎯Threat Hunting
Stop Calling It OSINT
dutchosintguy.com·3d
🔎OSINT Techniques
Position Regarding the "Chat Control" EU Regulation Proposal
techblog.bozho.net·1h·
Discuss: Hacker News
⚖️Legal Compliance
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·19h
🎯Threat Hunting
Insights: Telling You What We Really Think
unit42.paloaltonetworks.com·15h
🎯Threat Hunting
Go module for brute force attacks on SSH steals the accesses found
heise.de·23h
🛣️BGP Hijacking
AI devours your information: It knows what you search for, do and upload — and uses that data
english.elpais.com·2d
🔒Privacy Preserving
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.re·22h
🤝Paxos Consensus
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.com·19h
👁️Observatory Systems
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
Using information theory to solve Mastermind
goranssongaspar.com·2d·
Discuss: Hacker News
🧮Kolmogorov Bounds
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
techcrunch.com·15h
🔓Hacking
AI in cybersecurity operations
jwgoerlich.com·15h
🛡Cybersecurity
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·18h·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
25th August – Threat Intelligence Report
research.checkpoint.com·22h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap