🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕳️ Information Leakage

Side Channels, Covert Communication, Security Analysis, Data Exfiltration

Recommended email providers • Cory Dransfeldt
coryd.dev·52m
🏠Personal Archives
Surveillance is inequality’s stabilizer
doctorow.medium.com·1h
🧲Magnetic Philosophy
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·2d
🔐Quantum Security
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·1d
🦠Malware Analysis
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
Hackers deploy fake SonicWall VPN App to steal corporate credentials
securityaffairs.com·1d
🎫Kerberos Exploitation
Hundreds of MCP Servers Expose AI Models to Abuse, RCE
darkreading.com·1d
🔓Hacking
Keylime: Pushing the Boundaries of Remote Attestation on the Edge - DevConf.CZ 2025
youtube.com·10h
🔒Hardware Attestation
AppSec as Glue: Building Partnerships to Scale Security
tldrsec.com·3h·
Discuss: Hacker News
🔐Capability Systems
Learning-based safety lifting monitoring system for cranes on construction sites
arxiv.org·14h
📄Document Digitization
The Future of AI-Augmented Infrastructure: Letting AI Handle the Terraform Tax
devops.com·7h
🌊Stream Processing
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·5h
🎯Threat Hunting
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·2d
⚔️Lean Tactics
AI Agents Explained: How They Think & Operate
dev.to·3h·
Discuss: DEV
🔲Cellular Automata
The complexity trap: why cybersecurity must be simplified
techradar.com·1d
🛡Cybersecurity
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·2d
🎫Kerberos Exploitation
5 Ways to Automate Security and Compliance in a Cloud-First World
hackernoon.com·4h
🔓Hacking
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·10h
🔐CBOR
VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels
arxiv.org·2d
✋Tactile Computing
Loading...Loading more...
AboutBlogChangelogRoadmap