🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

Encrypting identifiers in practice
sjoerdlangkemper.nl·17h
🌊Stream Ciphers
What’s a “public internet?”
doctorow.medium.com·5h
🖥️Self-hosted Infrastructure
Digital Forensics Round-Up, June 25 2025
forensicfocus.com·8h
🔬Archive Forensics
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🏺Kerberos Archaeology
Exploiting the Human Layer: Scattered Spider’s Identity-Centric Attack Chain (2022–2025)
research.kudelskisecurity.com·2d
🎯Threat Hunting
Hello, Medium Family! Yamini Yadav Here, Sharing My OSCP Journey & Essential Port Insights!
infosecwriteups.com·14h
🔓Hacking
Cybersecurity Basics: We're Cyber Essentials Recertified in 2025 (How You Can Do It Too)
thoughtbot.com·22h
🛡Cybersecurity
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·1d·
Discuss: Hacker News
🎯NTLM Attacks
Open Security News week 25-2025
nocomplexity.com·3d
🔓Hacking
Computer-vision research powers surveillance technology
nature.com·6h·
Discuss: Hacker News
🔎OSINT Techniques
Supporting Deterministic Traffic on Standard NICs
arxiv.org·1d
📡Network Calculus
Future-Proofing APIs: Intelligent Gateways in the Age of AI and Kubernetes
dev.to·4h·
Discuss: DEV
🔌Interface Evolution
How to Build an OPSEC Culture in Your Organization
securityscorecard.com·6h
🎯Threat Hunting
Building a Custom Amazon VPC from Scratch 🚀
dev.to·9h·
Discuss: DEV
🌐DNS over QUIC
Excalidraw+ Is Now SoC 2 Certified
plus.excalidraw.com·1d·
Discuss: Hacker News
🔐PKI Archaeology
What Is a Web Application Firewall and Do You Need One?
securityscorecard.com·1d
🌊Stream Processing
Multi user authentication with multi user access and multi role access
dev.to·1d·
Discuss: DEV
🔐Capability Security
Web Numbers
ar.al·8h·
Discuss: Hacker News
📡DNS Archaeology
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
securityscorecard.com·7h
🕵️Penetration Testing
Ossification and the Internet
potaroo.net·1d·
Discuss: Hacker News
📡Network Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap