๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ณ๏ธ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Literature Review of the Effect of Quantum Computing on Cryptocurrencies using Blockchain Technology
arxiv.orgยท2h
๐Ÿ”Quantum Security
Tempest-LoRa: Cross-Technology Covert Communication
github.comยท22hยท
Discuss: Hacker News
๐Ÿ“ปHomebrew Protocols
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.comยท16h
๐Ÿ›กCybersecurity
A neat idea, but I can see this leading to the Balkanization of the Internet
boston.conman.orgยท4h
๐Ÿ›กCybersecurity
How Deep Research Agents Can Leak Your Data
embracethered.comยท1d
๐ŸงชProtocol Fuzzing
The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.comยท18h
๐ŸŽฏThreat Hunting
Stop Calling It OSINT
dutchosintguy.comยท3d
๐Ÿ”ŽOSINT Techniques
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.comยท16h
๐ŸŽฏThreat Hunting
Insights: Telling You What We Really Think
unit42.paloaltonetworks.comยท12h
๐ŸŽฏThreat Hunting
Go module for brute force attacks on SSH steals the accesses found
heise.deยท20h
๐Ÿ›ฃ๏ธBGP Hijacking
AI devours your information: It knows what you search for, do and upload โ€” and uses that data
english.elpais.comยท2d
๐Ÿ”’Privacy Preserving
Knowledge and Common Knowledge in a Distributed Environment, Part 2
emptysqua.reยท19h
๐ŸคPaxos Consensus
Unmasking the Unseen: Your Guide to Taming Shadow AI with Cloudflare One
blog.cloudflare.comยท16h
๐Ÿ‘๏ธObservatory Systems
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.comยท2dยท
Discuss: www.blogger.com
๐ŸŽฏThreat Hunting
Using information theory to solve Mastermind
goranssongaspar.comยท2dยท
Discuss: Hacker News
๐ŸงฎKolmogorov Bounds
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
techcrunch.comยท12h
๐Ÿ”“Hacking
Barking Up The Ratchet Tree โ€“ MLS Is Neither Royal Nor Nude
soatok.blogยท15hยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ”‘Cryptographic Protocols
AI in cybersecurity operations
jwgoerlich.comยท12h
๐Ÿ›กCybersecurity
25th August โ€“ Threat Intelligence Report
research.checkpoint.comยท19h
๐Ÿ”“Hacking
How to spot high-activity devices & stop scaled abuse in its tracks
fingerprint.comยท8h
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap