🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·14h
🛡️eBPF Security
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·9h
🕵️Vector Smuggling
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·10h
🛡️eBPF Security
A Standard for Human-Centered Investigation Playbooks
chrissanders.org·4h
🎯Threat Hunting
Efficient Malware Detection with Optimized Learning on High-Dimensional Features
arxiv.org·1d
📐Vector Dimensionality
AI Powered Honeypot
dev.to·1h·
Discuss: DEV
🌐WARC Forensics
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.org·1d
🎫Kerberos Exploitation
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·13h
🎯Threat Hunting
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·1d
🎫Kerberos Exploitation
How to Build an OPSEC Culture in Your Organization
securityscorecard.com·7h
🎯Threat Hunting
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
Program Execution, follow-up
windowsir.blogspot.com·10h·
Discuss: www.blogger.com
⚡Performance Tools
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·13h
🎫Kerberos Attacks
North Korea - Cyber Threat Actor Profile
cstromblad.com·4h
🇸🇪Nordic Cryptography
And Now Malware That Tells AI to Ignore It?
darkreading.com·1h
🔓Hacking
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.com·6h
🔓Hacking
In the Blink of an LED, Secrets Slip Away: The Rise of Optical Data Theft
hackernoon.com·1d
💿Optical Forensics
How do CAPTCHAs Work?
corero.com·9h
⚡Proof Automation
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
How to Prove That An Email Was Received
metaspike.com·3h
📄Document Digitization
Loading...Loading more...
AboutBlogChangelogRoadmap