🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🌐 Network Security

Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection

Using AI Chatbots to examine leaked data
pentestpartners.com·2d
🚨Incident Response
Some Early Tests and Notes on ChatGPT Agent
macstories.net·20h
🎙️Whisper
Codeminer42 Dev Weekly #70
blog.codeminer42.com·1d
🔄Reproducible Builds
Digitally Syndicated Book Reviews
cyberb.space·12h
📡RSS Readers
What async communication patterns lead to better outcomes for engineers?
rdel.substack.com·1d·
Discuss: Substack
🌊Stream Processing
Microsoft Names Threat Actors
learn.microsoft.com·2d·
Discuss: Hacker News
🎫Kerberos Exploitation
Post-Quantum Cryptography 2025: Latest Developments and Why It Matters
dev.to·3d·
Discuss: DEV
🔐Quantum Security
Let the Games Begin: How Cybersecurity Competitions Build Skills, Careers, and Community
backblaze.com·4d
🎯Threat Hunting
Connectivity Without Exposure
dev.to·4d·
Discuss: DEV
🛡Cybersecurity
A Wide Reduction Trick (2022)
words.filippo.io·3d·
Discuss: Lobsters, Hacker News, r/programming
🌳Archive Merkle Trees
Looking for Identity Aware Proxy for self-hosted cluster
reddit.com·19h·
Discuss: r/kubernetes
🖥️Self-hosted Infrastructure
Max severity Cisco ISE bug allows pre-auth command execution, patch now
bleepingcomputer.com·2d·
Discuss: Hacker News
🔓Hacking
GoXStream: My Go Stream Processing Side Project
reddit.com·1d·
Discuss: r/golang
🌊Streaming Systems
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.com·4d·
Discuss: Hacker News
🌐WASI
APIs Are Eating the Internet—And Hackers Are Eating APIs
hackernoon.com·4d
🔓Hacking
UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations
securityaffairs.com·3d
🦠Malware Analysis
Integrating Model Context Protocol with Gemini: The Definitive Guide to Modern Tool Calling (Agentic-AI)
dev.to·17h·
Discuss: DEV
🔌Interface Evolution
Turning My Homelab into a Smart Home Automation Powerhouse 🚀
reddit.com·50m·
Discuss: r/homelab
🏠Homelab Automation
A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
techcrunch.com·1d
🎫Kerberos Exploitation
H-Nets – The Future
goombalab.github.io·2d·
Discuss: Hacker News
📼Cassette Combinators
Loading...Loading more...
AboutBlogChangelogRoadmap