🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

The Impact of the Cyber Assessment Framework (CAF) on Digital Investigations
digitalforensicsmagazine.com·6h
🎯Threat Hunting
How Does a Firewall Work Step by Step
kalilinuxtutorials.com·1d·
Discuss: Hacker News
🌐Network Security
Course Review: "Advanced Detection Engineering in the Enterprise"
lockboxx.blogspot.com·2d·
Discuss: www.blogger.com
🎯Threat Hunting
InfoSec News Nuggets 8/25/2025
aboutdfir.com·6h
🔓Hacking
Adaptive DDoS Mitigation via Hyper-Dimensional Signature Correlation & Dynamic Recursion
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
The Limits of NTP Accuracy on Linux
scottstuff.net·5h·
Discuss: Lobsters, Hacker News
🎯Emulation Accuracy
Beyond the ban: A better way to secure generative AI applications
blog.cloudflare.com·5h
🔒Language-based security
Enterprise security faces new challenge as attackers master art of digital impersonation
techradar.com·5h
🎯Threat Hunting
Claude Code's 19 cent Parser
blogger.com·6h
🔧Binary Parsers
Can I possibly get some help with this design?
reddit.com·32m·
Discuss: r/homelab
🛣️BGP Hijacking
Trust Spanning Protocol (TSP) Specification
trustoverip.github.io·4h·
Discuss: Hacker News
🌳Archive Merkle Trees
25th August – Threat Intelligence Report
research.checkpoint.com·8h
🔓Hacking
Securing the Cloud in an Age of Escalating Cyber Threats
darkreading.com·5h
🛡Cybersecurity
Fremont woman got out of the shower and came face-to-face with iPhone camera
mercurynews.com·2h
🚨Incident Response
AWS, Cloudflare, Digital Ocean, and Google helped Feds investigate alleged Rapper Bot DDoS perp
theregister.com·18h
🔓Hacking
Wavelet-Enhanced PaDiM for Industrial Anomaly Detection
arxiv.org·15h
🧠Machine Learning
Tempest-LoRa: Cross-Technology Covert Communication
github.com·11h·
Discuss: Hacker News
📻Homebrew Protocols
When Switches Flood LLDP Traffic
blog.ipspace.net·11h
📡Network Protocol Design
Go module for brute force attacks on SSH steals the accesses found
heise.de·8h
🛣️BGP Hijacking
My year-long quest to debug a single TCP connection
fdi.sk·2d·
Discuss: Hacker News
📡Network Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap