๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ” PAKE Protocols

Password Authentication, Zero Knowledge, Secure Login, Cryptographic Exchange

Two For The Price Of One: BornHack 2024 And 2025 Badges
hackaday.comยท19h
๐Ÿ‡ฉ๐Ÿ‡ฐDanish Computing
Security platform: Socket expands security offering with Scala and Kotlin
heise.deยท4d
๐Ÿ’งLiquid Types
Hack The Box Academy Writeup โ€” PASSWORD ATTACKS โ€” Writing Custom Wordlists and Rules
infosecwriteups.comยท1d
๐Ÿ”“Password Cracking
<div xmlns="http://www.w3.org/1999/xhtml"> The X11 SECURITY extension from the 1990ies </div>
uninformativ.deยท38m
๐Ÿ”“Hacking
[RFC] Hardening mode for the compiler - Clang Frontend
discourse.llvm.orgยท17hยท
Discuss: Hacker News, r/cpp
๐ŸญCompiler Backends
6 Ways to prevent a man-in-the-middle (MitM) attack
fingerprint.comยท1d
๐ŸŽฏNTLM Attacks
Proton Releases New Two-Factor Authentication App
macrumors.comยท2d
๐Ÿ›ก๏ธARM TrustZone
SecurityScorecard Discovers new botnet, โ€˜Zhadnost,โ€™ responsible for Ukraine DDoS attacks
securityscorecard.comยท19h
๐ŸŽซKerberos Attacks
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
tenable.comยท23h
๐Ÿ”“Hacking
Naked on the Internet
brajeshwar.comยท4d
๐Ÿ”“Hacking
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
praetorian.comยท2d
๐ŸบKerberos Archaeology
charmbracelet/wish: Make SSH apps, just like that! ๐Ÿ’ซ
github.comยท1d
๐Ÿ“ปHomebrew Protocols
Applications Of Zero-Knowledge Proofs On Bitcoin
arxiv.orgยท3d
๐Ÿ”—Hash Chains
The Good, the Bad and the Ugly in Cybersecurity โ€“ Week 31
sentinelone.comยท23h
๐Ÿ›กCybersecurity
Network Security: A Systems Approach
systemsapproach.orgยท5d
๐ŸŒNetwork Security
Data Privacy Challenges in Open MCP Architectures
hackernoon.comยท3d
๐Ÿ”’WASM Capabilities
InfoSec News Nuggets 7/31/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Understanding Streamable HTTP (the new one after SSE) of MCP Server/Client Architecture (+vs SSE)
dev.toยท1dยท
Discuss: DEV
โšกgRPC
How attackers are still phishing "phishing-resistant" authentication
bleepingcomputer.comยท2dยท
Discuss: Lobsters
๐ŸŽฏNTLM Attacks
CISA roasts unnamed critical national infrastructure body for shoddy security hygiene
theregister.comยท4hยท
Discuss: Hacker News
๐Ÿ›กCybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap