🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

GuardXP: From Data Privacy to Improved Cybersecurity
labs.ripe.net·3d
🔐Certificate Analysis
using Sun Ray thin clients in 2025
catstret.ch·2h
❄Nix
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·4d
🎯Threat Hunting
China Allegedly Plotted Provocation Against Taiwan's Vice President in Prague
thedailyguardian.com·1d·
Discuss: Hacker News
🌐WARC Forensics
A CRDT-based Messenger in 12 Lines of Bash Using a Synced Folder
holdtherobot.com·3d·
Discuss: Lobsters, Hacker News, Hacker News
🔀CRDT
Observability in the Age of AI
blog.buildrappo.com·3d·
Discuss: Hacker News
👁️System Observability
How Code Feedback MCP Enhances AI-Generated Code Quality
blog.niradler.com·1d
⚡Proof Automation
Attacks on remote maintenance weak points in servers from HPE, Lenovo and Co.
heise.de·2d
🔓Hacking
The Impact of Regular Training and Timely Security Policy Changes on Dev Teams
thenewstack.io·1d
🔄Language Evolution
Kitab An-Nur – Preserving human experiences before AI content takes over
news.ycombinator.com·17h·
Discuss: Hacker News
🌐Web Archiving
AI agents get office tasks wrong around 70% of the time, and a lot of them aren't AI at all
theregister.com·14h·
Discuss: Hacker News
⚡Proof Automation
Linux from the developer's perspective. Part 1 - C language introduction
dev.to·16h·
Discuss: DEV
🔩Systems Programming
CharacterKB: Your AI-Powered Companion for Fictional Characters
dev.to·11h·
Discuss: DEV
🌀Brotli Internals
AI-Powered Ticket Routing & SLA Breach Prediction in JIRA- My Real-World Automation Journey
dev.to·6h·
Discuss: DEV
📏Code Metrics
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·3d
🎯Threat Hunting
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·4d
🔓Hacking
🔥Top 5 Amazing CLI Tools🤯
dev.to·9h·
Discuss: DEV
🪟Awesome windows command-line
Practical and Accurate Local Edge Differentially Private Graph Algorithms
arxiv.org·2d
🗜️Graph Compression
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·5d
⚔️Lean Tactics
Threat-Aware Automation: Making Security a First-Class Citizen in Your Test Suite
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap