Feeds to Scour
SubscribedAll
Scoured 9573 posts in 1.74 s
How Data Travels: Packet Switching vs Circuit Switching
infosecwriteups.com
·21h
📼Cassette Networking
Preview
Report Post
Debugging ETW Event Drops in High-Throughput Applications
yasoob.me·4h
👁️Observatory Systems
Preview
Report Post
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
dev.to·17h·
Discuss: DEV
📡Network Monitoring
Preview
Report Post
Digital Forensics: Registry Analysis for Beginners, Part 1 – Hives, Logs, and Acquisition – Hackers Arise
hackers-arise.com·1d
🔍NTLM Forensics
Preview
Report Post
Forget OpenVPN, WireGuard: This is the VPN protocol of the future
techradar.com
·19h
🧅Tor Networks
Preview
Report Post
The 3 a.m. Call That Changed The Way I Design APIs
thenewstack.io·8h
👁️Observatory Systems
Preview
Report Post
NEWS ROUNDUP – 26th December 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Preview
Report Post
Flock and Urban Surveillance
computer.rip·1d·
Discuss: Hacker News
🎯Threat Hunting
Preview
Report Post
Linux perf Examples
brendangregg.com·17h
📊Performance Profiling
Preview
Report Post
Natural language processing for word sense disambiguation and information extraction
arxiv.org·17h·
Discuss: r/compsci
📥Feed Aggregation
Preview
Report Post
Hacking washing machines (39c3)
cdn.media.ccc.de·3h
📼Cassette Hacking
Preview
Report Post
Bypass Windows user interface privilege isolation via the CTF input method proto
projectzero.google·1d·
Discuss: Hacker News
🎯NTLM Attacks
Preview
Report Post
These are the cybersecurity stories we were jealous of in 2025
techcrunch.com·1d
🔓Hacking
Preview
Report Post
Network Programming
theworld.com·1d
📡Network Protocol Design
Preview
Report Post
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.to·18h·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
Evasive Panda APT poisons DNS requests to deliver MgBot
securelist.com·3d
🌐DNS Security
Preview
Report Post
Show HN: BrandRetina – screenshot similarity API for spear-phish detection
brandretina.ai·1d·
Discuss: Hacker News
🔗Binary Similarity
Preview
Report Post
Towards a Security Plane for 6G Ecosystems
arxiv.org·2d
gRPC
Preview
Report Post
Bitsight Threat Intelligence Briefing: Top TTPs Leveraged by Threat Actors in 2025
bitsight.com·3d
🎯Threat Hunting
Preview
Report Post
tomer8007/mtproto-dissector: Wireshark plugin for dissecting the Telegram protocol
github.com·2d·
Discuss: Hacker News
🌐NetworkProtocols
Preview
Report Post