🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

A transatlantic communications cable does double duty
phys.org·1d
📼Cassette Archaeology
Quoting Terence Eden
simonwillison.net·2h
⚖️Lossy Compression Ethics
Fail-Open Architecture for Secure Inline Protection on Azure
lab.wallarm.com·6h
🏠Homelab Security
Endpoint Protection Redefined: Insights from the 2025 Gartner® Magic Quadrant™ for EPP, and How Agentic AI and Platformization Are Shaping the Market
sentinelone.com·52m
👁️Observatory Systems
On the Move: Fast Flux in the Modern Threat Landscape
bitsight.com·2d
📡BGP Archaeology
Does DNS Security Matter?
systemsapproach.org·3d
🌐DNS Security
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.com·3d
🎫Kerberos Exploitation
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.com·2d
🤝Distributed Consensus
Google finds custom backdoor being installed on SonicWall network devices
arstechnica.com·20h·
Discuss: Hacker News
🔓Hacking
ZeroTouch: Reinforcing RSS for Secure Geofencing
esat.kuleuven.be·1d
🛡️ARM TrustZone
We built a real-time service that handles 20k updates per second
trigger.dev·1h·
Discuss: Hacker News
🌊Stream Processing
Day 4 of Learning System Design: Mastering Consistent Hashing
dev.to·5h·
Discuss: DEV
🌐Distributed Hash
Patch Package OTP 26.2.5.14 Released – Erlang News
erlangforums.com·3h·
Discuss: Hacker News
❄️Nixpkgs
API Auth Is Deeper Than It Looks
nango.dev·1d·
Discuss: Hacker News
🔌Interface Evolution
Self-hosting CI runners is a trap
shipfox.io·4h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating
blogs.cisco.com·2d
🕵️Penetration Testing
Pre-Auth SQLi to RCE – Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.com·2d·
Discuss: Hacker News
🛡️CBOR Security
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.org·1h·
Discuss: Hacker News
🔒WASM Capabilities
AtCoder Finals Problem Statement
atcoder.jp·23h·
Discuss: Hacker News
🇯🇵Japanese Computing
Wi-Fi: Twenty-Five Years and Counting
arxiv.org·2d
📡Network Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap