๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ณ๏ธ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Two Types of Data Privacy Controls
cacm.acm.orgยท1d
๐Ÿ›ก๏ธDifferential Privacy
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgยท7h
๐ŸŒDNS Security
Wireless Airspace Defense for Modern Data Centers
bastille.netยท20h
๐Ÿ“กNetwork Monitoring
The Cybersecurity Challenges Behind Your Feed
cyberthreatalliance.orgยท2d
๐Ÿ›กCybersecurity
On A.I. Video Watermarks
pxlnv.comยท7h
๐ŸŒŠAudio Watermarks
eSIM Hack Allows for Cloning, Spying
securityweek.comยท2dยท
Discuss: Hacker News
๐Ÿฆ Parasitic Archives
APIs Are Eating the Internetโ€”And Hackers Are Eating APIs
hackernoon.comยท6h
๐Ÿ”“Hacking
New research connects quantum computing power to the security of cryptographic systems
phys.orgยท1d
๐Ÿ”Quantum Security
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท18h
๐ŸบZIP Archaeology
Texas sharpshooter fallacy - Wikipedia
en.m.wikipedia.orgยท24m
๐Ÿ”ฒProof Irrelevance
You Canโ€™t Make This Stuff Up
irreal.orgยท19h
๐Ÿ”“Hacking
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท2d
๐Ÿ”Cryptographic Archaeology
Ex-US soldier who Googled 'can hacking be treason' pleads guilty to extortion
theregister.comยท13h
๐Ÿ•ต๏ธVector Smuggling
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท7h
๐Ÿ”“Hacking
MCP: A Practical Security Blueprint for Developers
thenewstack.ioยท15h
๐Ÿ”“Hacking
Hackers exploit a blind spot by hiding malware inside DNS records
arstechnica.comยท34m
๐ŸŒDNS Security
Students, here are 5 key things to know when learning how to train large language models
techradar.comยท18h
๐Ÿ’ปLocal LLMs
Streamline Global Client Communication with 20 Secure Accounts
news.ycombinator.comยท40mยท
Discuss: Hacker News
๐Ÿ”คEBCDIC Privacy
Trace Every Identity Action with Teleport Identity Security
goteleport.comยท1d
๐Ÿ”—Data Provenance
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.comยท2d
๐ŸŽซKerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap