🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Network Forensics

Packet Analysis, Traffic Archaeology, Protocol Investigation, Digital Evidence

AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·8h
🎯Threat Hunting
Call for Testing: Network Interface Driver Fix for OpenBSD
discoverbsd.com·1d
🛡️eBPF Security
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.com·5h
🎫Kerberos Attacks
How do CAPTCHAs Work?
corero.com·4h
⚡Proof Automation
The Inefficiency in Digital Forensics
cyb3rops.medium.com·2d
🚨Incident Response
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
Beyond Observability: Network Intelligence Will Make Network Management Obsolete
kentik.com·23h·
Discuss: Hacker News
📊Homelab Monitoring
Inspecting Service Traffic with mirrord dump
metalbear.co·8h·
Discuss: Lobsters, Hacker News
🔍eBPF
Canadian provider: Unpatched Cisco security vulnerability as a gateway
heise.de·1d
🌐BGP Security
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·3h
🎯Threat Hunting
Rethinking Network Security
reddit.com·3d·
Discuss: r/homelab
🔍eBPF
Typhoon-like gang slinging TLS certificate 'signed' by the Los Angeles Police Department
theregister.com·1d
🔓Hacking
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·20h
🎫Kerberos Exploitation
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.com·1d
🔓Password Cracking
How to (Almost) solve cybersecurity once and for all
adaptive.live·21h·
Discuss: Hacker News
🔐Systems Hardening
InfoSec News Nuggets 6/24/2025
aboutdfir.com·1d
🛡Cybersecurity
Keystroke Forensics 101: Extracting Secrets from USB Traffic
infosecwriteups.com·10h
🔍NTLM Forensics
Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals
arxiv.org·1d
🧠Machine Learning
PRC cyber actors target telecom companies as part of a cyberespionage campaign
cyber.gc.ca·1d·
Discuss: Hacker News
🕵️Penetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap