🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·9h
🛡️eBPF Security
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·4h
🕵️Vector Smuggling
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·5h
🛡️eBPF Security
Efficient Malware Detection with Optimized Learning on High-Dimensional Features
arxiv.org·1d
📐Vector Dimensionality
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🎫Kerberos Exploitation
How to Build an OPSEC Culture in Your Organization
securityscorecard.com·1h
🎯Threat Hunting
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·7h
🎯Threat Hunting
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·19h
🎫Kerberos Exploitation
Program Execution, follow-up
windowsir.blogspot.com·5h·
Discuss: www.blogger.com
⚡Performance Tools
How to (Almost) solve cybersecurity once and for all
adaptive.live·20h·
Discuss: Hacker News
🔐Systems Hardening
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·8h
🎫Kerberos Attacks
Computer-vision research powers surveillance technology
nature.com·1h
🔎OSINT Techniques
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·11h·
Discuss: DEV
🌐Network Protocols
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.com·1h
🔓Hacking
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·23h
💿Optical Forensics
How do CAPTCHAs Work?
corero.com·3h
⚡Proof Automation
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·2h
🎯Threat Hunting
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Bot or Human? Creating the Invisible Turing Test for the Internet
research.roundtable.ai·2h·
Discuss: Hacker News
🎯Threat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap