🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

What is Phishing? Introduction to Phishing Demo (for Beginners)
offsec.com·2d
🎯Threat Hunting
The Leading CISO Strategy to Pentesting as a Service
hackerone.com·5h
🕵️Penetration Testing
Quoting Terence Eden
simonwillison.net·7h
⚖️Lossy Compression Ethics
Fail-Open Architecture for Secure Inline Protection on Azure
lab.wallarm.com·11h
🏠Homelab Security
The “Working from China” Problem
magoo.medium.com·1h
🇨🇳Chinese Computing
Does DNS Security Matter?
systemsapproach.org·3d
🌐DNS Security
Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
unit42.paloaltonetworks.com·3d
🎫Kerberos Exploitation
The Charismulator
cambridge.org·3h·
Discuss: Hacker News
🎯Threat Hunting
Musings of a Trust Architect: When Technical Standards Meet Geopolitical Reality
lifewithalacrity.com·2d
🤝Distributed Consensus
We built a real-time service that handles 20k updates per second
trigger.dev·5h·
Discuss: Hacker News
🌊Stream Processing
Self-hosting CI runners is a trap
shipfox.io·9h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Pre-Auth SQLi to RCE – Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.com·2d·
Discuss: Hacker News
🛡️CBOR Security
Engineering Behind Fast Analytics: Data in Motion
outofdesk.netlify.app·4h·
Discuss: Hacker News
💎Information Crystallography
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.org·6h·
Discuss: Hacker News
🔒WASM Capabilities
AtCoder Finals Problem Statement
atcoder.jp·1d·
Discuss: Hacker News
🇯🇵Japanese Computing
Wi-Fi: Twenty-Five Years and Counting
arxiv.org·2d
📡Network Archaeology
Looking for Home Network Design Best Practices & Setup Templates
reddit.com·2d·
Discuss: r/homelab
🏠HomeLab
We've got to stop sending files to each other
shkspr.mobi·10h·
Discuss: Lobsters, Hacker News, shkspr.mobi
🏠Personal Archives
A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning
arxiv.org·18h
🤐Secure Multiparty
Quantum code breaking? You'd get further with an 8-bit computer, an abacus, and a dog
theregister.com·10h·
Discuss: Hacker News
🔐Quantum Security
Loading...Loading more...
AboutBlogChangelogRoadmap