๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿฆ  Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

AI-Driven Cybersecurity Threat Detection: Building Resilient Defense Systems Using Predictive Analytics
arxiv.orgยท1h
๐ŸŽฏThreat Hunting
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท19h
๐ŸบKerberos Archaeology
Plague: A Newly Discovered Pam-Based Backdoor for Linux
nextron-systems.comยท2dยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
How to detect and block malicious web crawlers in 2025
fingerprint.comยท11h
๐ŸŒWARC Forensics
Hack Smarter: Automate Security Testing with LLMs and the CAI Framework
infosecwriteups.comยท1d
๐Ÿ Homelab Pentesting
Introductory Computer Science and Software Engineering Topics
albertyw.comยท1d
๐Ÿ› Language Design
Python-powered malware snags hundreds of credit cards, 200K passwords, and 4M cookies
theregister.comยท10hยท
Discuss: Hacker News
๐Ÿ”“Hacking
OWASP ASVS 5.0.0 is here!
scotthelme.ghost.ioยท19h
๐Ÿ›ก๏ธWASM Sandboxing
Organized scientific fraud is growing at an alarming rate, study uncovers
phys.orgยท10h
๐Ÿ’งManuscript Watermarks
IT Security Weekend Catch Up โ€“ August 1, 2025
badcyber.comยท3d
๐Ÿ”“Hacking
Machine Learning Fundamentals: machine learning with python
dev.toยท11hยท
Discuss: DEV
๐Ÿง Machine Learning
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
darkreading.comยท14h
๐Ÿ”“Hacking
Simple Methods Defend RAG Systems Well Against Real-World Attacks
arxiv.orgยท1h
๐Ÿ”Systems Hardening
Mobile app analytics library led to the PII exposure
cossacklabs.comยท13hยท
Discuss: Hacker News
๐ŸšจIncident Response
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
embracethered.comยท22hยท
Discuss: Hacker News
๐Ÿ”“Password Cracking
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท18h
โš—๏ธAlgebraic Coding
Digital Forensics Jobs Round-Up, August 04 2025
forensicfocus.comยท15h
๐ŸšจIncident Response
4th August โ€“ Threat Intelligence Report
research.checkpoint.comยท19h
๐Ÿ”“Hacking
People can exploit your social media pictures and so I've made a tool
news.ycombinator.comยท6hยท
Discuss: Hacker News
โ›๏ธFile Carving
Evading Data Provenance in Deep Neural Networks
arxiv.orgยท1h
๐Ÿ”Vector Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap