🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·6h
🛡️eBPF Security
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·1h
🕵️Vector Smuggling
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·2h
🛡️eBPF Security
Efficient Malware Detection with Optimized Learning on High-Dimensional Features
arxiv.org·1d
📐Vector Dimensionality
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🎫Kerberos Exploitation
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·4h
🎯Threat Hunting
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·16h
🎫Kerberos Exploitation
Program Execution, follow-up
windowsir.blogspot.com·2h·
Discuss: www.blogger.com
⚡Performance Tools
How to (Almost) solve cybersecurity once and for all
adaptive.live·18h·
Discuss: Hacker News
🔐Systems Hardening
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·5h
🎫Kerberos Attacks
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·8h·
Discuss: DEV
🌐Network Protocols
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·21h
💿Optical Forensics
Sonicwall warns of fake NetExtender app infected with malicious code
heise.de·5h
🎫Kerberos Exploitation
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Show HN: Logcat.ai – AI-powered observability for Operating Systems | Free Beta
logcat.ai·21h·
Discuss: Hacker News
🔍eBPF
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
What Are Best Practices for Data Security for Sensitive Data?
securityscorecard.com·17h
🔗Data Provenance
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·48m
🕵️Penetration Testing
Shostack + Associates > The Ultimate Beginner's Guide to Threat Modeling
shostack.org·1d
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap