🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Why should the US decide who can have certain tech?
disconnect.blog·22h
🧲Magnetic Philosophy
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.uk·1d
🧲RISC-V Archaeology
How to Prove That An Email Was Received
metaspike.com·17h
📄Document Digitization
Encrypting identifiers in practice
sjoerdlangkemper.nl·1d
🌊Stream Ciphers
AI Agents Are Getting Better at Writing Code—and Hacking It as Well
wired.com·20h
🔓Hacking
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Microsoft Teams Security Attack Matrix
cyberdom.blog·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Habits and Tools of Effective Remote Teams
jacobelder.com·19h·
Discuss: Hacker News
🎯Threat Hunting
Almost Every Way Websites Fingerprint You
donutbrowser.com·3d·
Discuss: Hacker News
🌐WARC Forensics
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.com·19h
🎫Kerberos Exploitation
Keylime: Pushing the Boundaries of Remote Attestation on the Edge - DevConf.CZ 2025
youtube.com·5h
🔒Hardware Attestation
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·9h
📄Document Digitization
The Future of AI-Augmented Infrastructure: Letting AI Handle the Terraform Tax
devops.com·2h
🌊Stream Processing
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·45m
🎯Threat Hunting
AI Powered Honeypot
dev.to·16h·
Discuss: DEV
🦠Malware Analysis
Underground forum: Five BreachForums admins arrested in France
heise.de·4h
🔓Hacking
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·2d
⚔️Lean Tactics
The complexity trap: why cybersecurity must be simplified
techradar.com·1d
🛡Cybersecurity
Go beyond storing passwords: Store passports, WiFi codes, SSH keys and more in Proton Pass
proton.me·1h
💿WORM Storage
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·2d
🎫Kerberos Exploitation
Loading...Loading more...
AboutBlogChangelogRoadmap