🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Tempest-LoRa: Cross-Technology Covert Communication
github.com·15h·
Discuss: Hacker News
📻Homebrew Protocols
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·9h
🛡Cybersecurity
Stop Calling It OSINT
dutchosintguy.com·3d
🔎OSINT Techniques
How Deep Research Agents Can Leak Your Data
embracethered.com·22h
🧪Protocol Fuzzing
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·11h
🎯Threat Hunting
Securing Kubernetes Layer by Layer: An OSI Approach
reddit.com·2h·
Discuss: r/kubernetes
📦Container Security
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·9h
🎯Threat Hunting
Insights: Telling You What We Really Think
unit42.paloaltonetworks.com·5h
🎯Threat Hunting
Go module for brute force attacks on SSH steals the accesses found
heise.de·13h
🛣️BGP Hijacking
AI devours your information: It knows what you search for, do and upload — and uses that data
english.elpais.com·1d
🔒Privacy Preserving
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.re·13h
🤝Paxos Consensus
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.com·9h
👁️Observatory Systems
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
techcrunch.com·6h
🔓Hacking
Using information theory to solve Mastermind
goranssongaspar.com·1d·
Discuss: Hacker News
🧮Kolmogorov Bounds
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·9h·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
25th August – Threat Intelligence Report
research.checkpoint.com·12h
🔓Hacking
AI in cybersecurity operations
jwgoerlich.com·6h
🛡Cybersecurity
The Mysterious Shortwave Radio Station Stoking US-Russia Nuclear Fears
wired.com·13h·
Discuss: r/technews
🇷🇺Soviet Computing
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.com·2h
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap