🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

Why the Old Ways Are Still the Best for Most Cybercriminals
darkreading.comΒ·2h
🎯Threat Hunting
Stop Exposing Your Home Lab
virtualizationhowto.comΒ·1dΒ·
Discuss: Hacker News
🏠Homelab Pentesting
Efficient Byzantine Consensus MechanismBased on Reputation in IoT Blockchain
arxiv.orgΒ·12h
🀝Consensus Algorithms
SonicWall investigates possible zero-day amid Akira ransomware surge
securityaffairs.comΒ·7h
πŸ”“Hacking
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgΒ·2d
πŸ’£ZIP Vulnerabilities
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beΒ·1d
βš—οΈAlgebraic Coding
Hacker summer camp: What to expect from BSides, Black Hat, and DEF CON
theregister.comΒ·5h
🎯Threat Hunting
Strengthening the UK's data center infrastructure
techradar.comΒ·1d
🏠Homelab Security
From the Depths of the Shadows: IRGC and Hacker Collectives Of The 12-Day War
securityscorecard.comΒ·5h
🎯Threat Hunting
In Cybersecurity, We Have to Work Together
tenable.comΒ·6h
πŸ”“Hacking
πŸš€ Learning Update: Bash, Python, and Cybersecurity Training!
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“ŸTerminal Forensics
Windows Authentication Monitoring
infosecwriteups.comΒ·1d
πŸ”NTLM Archaeology
Lessons from writing a Kubernetes Security book
medium.comΒ·1dΒ·
Discuss: Hacker News
πŸ“¦Container Security
4th August – Threat Intelligence Report
research.checkpoint.comΒ·1d
πŸ”“Hacking
Authentication vs. authorization: What’s the difference?
proton.meΒ·6h
πŸ”Capability Systems
Cisco’s Foundation AI Advances AI Supply Chain Security With Hugging Face
blogs.cisco.comΒ·4h
🎯Threat Hunting
Black Hat 2025: Why We Built a Museum Instead of a Booth
lab.wallarm.comΒ·1d
πŸ”Cryptographic Archaeology
How 1&1 Mail & Media Scaled Kubernetes Networking with eBPF and Calico
tigera.ioΒ·16m
🏠Homelab Federation
A New Concurrent ML in Guile Scheme
wingolog.orgΒ·7hΒ·
Discuss: Hacker News
πŸ”„Lens Laws
How to implement PaC for a more secure SDLC
reversinglabs.comΒ·1h
🏠Homelab Automation
Loading...Loading more...
AboutBlogChangelogRoadmap