🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Salesloft Drift Supply Chain Incident
blog.qualys.com·1d
🎫Kerberos Attacks
Book of All-Pairs Shortest Paths
olegkarasik.wordpress.com·1d·
Discuss: Hacker News
🕸️Graph Algorithms
Microsoft cloud services disrupted by Red Sea cable cuts
bbc.com·5h
🛡Cybersecurity
The World's 2.75B Buildings
tech.marksblogg.com·1d·
Discuss: Hacker News
📲Digitization
GPT-5 Thinking in ChatGPT (aka Research Goblin) is shockingly good at search
simonw.substack.com·13h·
Discuss: Substack
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Unleashing the Hound: How AI Agents Find Deep Logic Bugs in Any Codebase
muellerberndt.medium.com·2d·
Discuss: Hacker News
🔍Concolic Testing
Archaeologists Found a Secret Stash of Gold Coins That Rewrite the History of War
popularmechanics.com·7h
🏺Gaming Archaeology
Matmul on Blackwell: Part 2 – Using Hardware Features to Optimize Matmul
modular.com·2d·
Discuss: Hacker News
⚡SIMD Optimization
SectorC: A C Compiler in 512 bytes (2023)
xorvoid.com·4d·
Discuss: Hacker News
🔩Systems Programming
Top 5 Sites to Buy Naver Account
dev.to·3h·
Discuss: DEV
📡RSS Readers
Automated Weeding via Multi-Modal Sensor Fusion & Reinforcement Learning in Precision Tomato Farming
dev.to·19h·
Discuss: DEV
☕Precision Brewing
US puts $10M bounty on three Russians accused of attacking critical infrastructure
theregister.com·3d·
Discuss: Hacker News
🎫Kerberos Exploitation
Treasure Hunt in Anonymous Graphs with Quantum Pebbles by Oblivious Agents
arxiv.org·3d
🔐Quantum Security
Evaluating Diverse Feature Extraction Techniques of Multifaceted IoT Malware Analysis: A Survey
arxiv.org·3d
🦠Malware Analysis
Diffusion-RL Based Air Traffic Conflict Detection and Resolution Method
arxiv.org·2d
🔲Cellular Automata
AI Agent Security – Why You Should Pay Attention
medium.com·5d·
Discuss: Hacker News
🎯Threat Hunting
Unpatched Air Keyboard iOS App Lets Attackers Perform 0-Click Keystroke Injection Over Wi‑Fi
bastille.net·3d
🔓Hacking
IT threat evolution in Q2 2025. Mobile statistics
securelist.com·2d
🦠Malware Analysis
New AI-powered HexStrike tool is being used to target multiple Citrix security flaws
techradar.com·3d
🔓Hacking
AI Solves the Unsolvable: Automating Optimization with LLMs by Arvind Sundararajan
dev.to·12h·
Discuss: DEV
💻Local LLMs
Loading...Loading more...
AboutBlogChangelogRoadmap