🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis

Reverse Engineering, Binary Analysis, Behavior Study, Detection Evasion

Ay MaMi - Analyzing a New macOS DNS Hijacker
objective-see.comΒ·4d
🌐DNS Security
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.comΒ·21h
πŸ”“Hacking
Tempest-LoRa: Cross-Technology Covert Communication
github.comΒ·13hΒ·
Discuss: Hacker News
πŸ“»Homebrew Protocols
Dac-Fake: A Divide and Conquer Framework for Detecting Fake News on Social Media
arxiv.orgΒ·18h
πŸ”BitFunnel
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.comΒ·7h
🎯Threat Hunting
AI in cybersecurity operations
jwgoerlich.comΒ·4h
πŸ›‘Cybersecurity
Can I possibly get some help with this design?
reddit.comΒ·3hΒ·
Discuss: r/homelab
πŸ›£οΈBGP Hijacking
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.comΒ·5hΒ·
Discuss: Hacker News
πŸ”Archive Encryption
Risky Bulletin: Hackers sabotage Iranian ships at sea, again
news.risky.bizΒ·21h
πŸ›‘Cybersecurity
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blogΒ·9hΒ·
Discuss: Hacker News
⚑Proof Automation
InfoSec News Nuggets 8/25/2025
aboutdfir.comΒ·9h
πŸ”“Hacking
OpenBSD Hackathon Leipzig 2025: Qt6 Fixes, KDE PIM, and C++26 Updates
discoverbsd.comΒ·14h
πŸ”eBPF
How Prompt Injection Exposes Manus' VS Code Server to the Internet
embracethered.comΒ·11h
πŸš€Indie Hacking
Context Engineering: Bringing Engineering Discipline to Promptsβ€”Part 3
oreilly.comΒ·11h
πŸ”„Archival Workflows
How Does a Firewall Work Step by Step
kalilinuxtutorials.comΒ·1dΒ·
Discuss: Hacker News
🌐Network Security
How Hackers Trick AI: The Hidden World of Prompt Injections and Jailbreaks
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”“Hacking
A new security flaw in TheTruthSpy phone spyware is putting victims at risk
techcrunch.comΒ·4h
πŸ”“Hacking
Next-gen voice, video, and chat messaging using your domain name not your number
thunderbolt.comΒ·1dΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
The ABCs of β€œβ€‘ishing”: From Phishing to Quishing
bitsight.comΒ·4d
🎯Threat Hunting
Electronics manufacturer Data I/O took offline operational systems following a ransomware attack
securityaffairs.comΒ·15h
πŸ›‘Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap