🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

America’s economic data are becoming murkier
economist.com·1d
💰Archive Economics
Sinaloa Cartel Used Phone Data and Surveillance Cameras To Find and Kill FBI Informants in 2018, DOJ Says
yro.slashdot.org·1d
🔓Hacking
People Are Being Committed After Spiraling Into 'ChatGPT Psychosis'
slashdot.org·1d
🔓Hacking
What Is a Number?
idrisschebak.com·1d·
Discuss: Hacker News
📐Mathematical Art
Ultra: Universal Grammar as a Universal Parser
frontiersin.org·1d·
Discuss: Hacker News
🔗Monadic Parsing
Grok turned on Elon with almost no prompting. Uncanny is the only word I have
reddit.com·2d·
Discuss: r/artificial
📡Feed Archaeology
Ranking generative AI companies from most to least evil
cwodtke.medium.com·2d·
Discuss: Hacker News
🔲Cellular Automata
The Future of AI Is Physical: Simulation Is Key
website-staging.inductiva.ai·2d·
Discuss: Hacker News
🔲Cellular Automata
Sinaloa cartel hacked FBI phones to track and kill informants, US says
theguardian.com·2d·
Discuss: Hacker News
🔓Hacking
The Rationale for Continuous Delivery • Dave Farley • YOW! 2018
youtube.com·1d
🌊Streaming Systems
Aloha, you might’ve been pwned: Hawaiian Airlines discloses ‘cybersecurity event’
theregister.com·2d
🔓Hacking
SignBart -- New approach with the skeleton sequence for Isolated Sign language Recognition
arxiv.org·4h
🤖Advanced OCR
a loop is all you need: building conversation ai agents
dev.to·15h·
Discuss: DEV
🔲Cellular Automata
Analyzing and Fine-Tuning Whisper Models for Multilingual Pilot Speech Transcription in the Cockpit
arxiv.org·4h
🎙️Whisper
Automated endpoint management: a key to risk reduction in 2025
techradar.com·2d
🔓Hacking
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·5d
🎫Kerberos Exploitation
Big Data Fundamentals: hadoop tutorial
dev.to·12h·
Discuss: DEV
🌊Stream Processing
Cybercriminals are abusing LLMs to help them with hacking activities
techradar.com·2d
🔓Hacking
A Deep Learning framework for building damage assessment using VHR SAR and geospatial data: demonstration on the 2023 Turkiye Earthquake
arxiv.org·4h
🤖Advanced OCR
"Inside the Scale AI Data Leak: When Google Docs Became a Breach Point"
dev.to·3d·
Discuss: DEV
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap