🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Week 25 – 2025
thisweekin4n6.comΒ·3d
🌐WARC Forensics
What Is an AI SOC Agent? What You Need to Know About the Most Strategic Operational Imperative in Cybersecurity Today
intezer.comΒ·1m
🎯Threat Hunting
Show HN: Logcat.ai – AI-powered observability for Operating Systems | Free Beta
logcat.aiΒ·1dΒ·
Discuss: Hacker News
πŸ”eBPF
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·4h
πŸ•΅οΈPenetration Testing
Dire Wolf Ransomware Comes Out Snarling, Bites Technology, Manufacturing
darkreading.comΒ·2h
πŸ’ΏWORM Storage
Shostack + Associates > The Ultimate Beginner's Guide to Threat Modeling
shostack.orgΒ·1d
🎯Threat Hunting
Look right: Threat campaign fooling developers in GitHub repos – Programmer Zone
quiz.businessexplain.comΒ·15hΒ·
Discuss: Hacker News
πŸš€Indie Hacking
Digital Forensics Round-Up, June 25 2025
forensicfocus.comΒ·4h
πŸ”¬Archive Forensics
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.ioΒ·23h
πŸ’»Local LLMs
AI Agents Are Getting Better at Writing Codeβ€”and Hacking It as Well
wired.comΒ·1h
πŸ”“Hacking
Detect Narrative Threats with AI Personas
askrally.comΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Feed Archaeology
Behavioral Anomaly Detection in Distributed Systems via Federated Contrastive Learning
arxiv.orgΒ·14h
πŸ‘οΈObservatory Systems
In which I write a library-quality B+ tree with the genies
tidyfirst.substack.comΒ·3hΒ·
Discuss: Substack
πŸ¦€Rust Macros
Why Linux Isn't Immune: The Rising Tide of Malware and How to Respond
journal.hexmos.comΒ·3dΒ·
Discuss: Hacker News
πŸ”eBPF
AIsecTest & Ξ¨ AISysIndex: A New Frontier in AI Self-Awareness for Security
dev.toΒ·4hΒ·
Discuss: DEV
🎯Threat Hunting
Exploiting the Human Layer: Scattered Spider’s Identity-Centric Attack Chain (2022–2025)
research.kudelskisecurity.comΒ·2d
🎯Threat Hunting
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.comΒ·10h
πŸ”NTLM Forensics
Machine Learning Fundamentals: accuracy with python
dev.toΒ·1dΒ·
Discuss: DEV
πŸ‘οΈObservatory Systems
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.comΒ·11h
🎯Threat Hunting
Show HN: Laburity – Dark and Deep Web Monitoring
laburity.comΒ·1dΒ·
Discuss: Hacker News
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap