🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·17hΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
**Mastering HTTP/2 Server Performance Optimization in Go for High-Traffic Applications**
dev.toΒ·14hΒ·
Discuss: DEV
⚑gRPC
US military wants to secure the internet by making it more quantum
newscientist.comΒ·16h
βš›οΈQuantum Tape
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·17h
πŸ”Cryptographic Archaeology
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comΒ·1d
🌐DNS Security
Learning Decision Process Theory with a Wolfram Language Toolkit
blog.wolfram.comΒ·13h
πŸ”²Cellular Automata
VPNs With "No Logging Policy" You Can Use on Linux
itsfoss.comΒ·1d
πŸ›‘οΈeBPF Security
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.comΒ·1d
πŸ•΅οΈPenetration Testing
MoQ: Refactoring the Internet's real-time media stack
blog.cloudflare.comΒ·19hΒ·
Discuss: Hacker News
πŸ“žWebRTC
Micropycelium - prototype routable mesh network for ESP32
hackster.ioΒ·23h
πŸ•ΈοΈMesh Networking
Beyond the Hype: Critical Takeaways From BlackHat and Defcon
thenewstack.ioΒ·16h
🎯Threat Hunting
My year-long quest to debug a single TCP connection
fdi.skΒ·2hΒ·
Discuss: Hacker News
πŸ“‘Network Archaeology
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
isc.sans.eduΒ·2d
🌐DNS Security
Operational technology (OT): just like all the other horses
runzero.comΒ·1d
πŸ›‘Cybersecurity
SecureBitChat v4.01.412 Release
github.comΒ·1dΒ·
Discuss: Hacker News
🌐NetworkProtocols
Completed this year’s project!
reddit.comΒ·1dΒ·
Discuss: r/homelab
πŸ–₯Home Lab Setup
FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage
securityaffairs.comΒ·2d
πŸ•΅οΈVector Smuggling
The invisible battlefield: Good AI vs Bad AI in the evolving cybersecurity landscape
techradar.comΒ·1d
🎯Threat Hunting
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comΒ·20h
πŸ”“Hacking
'Impersonation as a service' the next big thing in cybercrime
theregister.comΒ·1d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap