🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Archives

Steganographic Storage, Covert Preservation, Hidden Data Channels, Format Camouflage

Mitigating Ransomware Attacks with Object Storage
blog.min.io·6h
💿WORM Storage
Early Signs of Steganographic Capabilities in Frontier LLMs
arxiviq.substack.com·2d·
Discuss: Substack
💻Local LLMs
Python Memory Optimization: Essential Techniques for Data-Intensive Applications That Actually Work
dev.to·8h·
Discuss: DEV
🔩Systems Programming
New Records Released – 2025 Third Quarter Release List
declassification.blogs.archives.gov·11h
💾Data Preservation
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
sentinelone.com·15h
🦠Malware Analysis
eSIM Bug in Millions of Phones Enables Spying, Takeover
darkreading.com·3h
🔓Hacking
Making file encryption fast and secure for teams with advanced key management
dropbox.tech·1d
🔐Homomorphic Encryption
The Onion Layers of Everything
brajeshwar.com·1h
🔓Hacking
An almost catastrophic OpenZFS bug and the humans that made it
despairlabs.com·11h·
Discuss: Lobsters, Hacker News
💿ZFS Internals
Disappearing Ink: Obfuscation Breaks N-gram Code Watermarks in Theory and Practice
arxiv.org·1d
💧Digital Watermarking
ufrisk/MemProcFS
github.com·1d
🛠️Greaseweazle
Yubi Whati? (YubiKeys, ECDSA, and X.509)
ram.tianon.xyz·18h
🔐PKI Archaeology
DoNot APT is expanding scope targeting European foreign ministries
securityaffairs.com·1d
🛡Cybersecurity
Rare (possibly unabbreviated) Voynichese words…
ciphermysteries.com·4h
📜Binary Philology
The Right Approach to Authorization in RAG
osohq.com·1d·
Discuss: Hacker News
🧬PostgreSQL Forensics
Fix the Click: Preventing the ClickFix Attack Vector
unit42.paloaltonetworks.com·15h
🎫Kerberos Exploitation
ATC/OSDI’25 Technical Sessions
muratbuffalo.blogspot.com·2h·
Discuss: www.blogger.com
🔌Interface Evolution
Nearly 250,000 records leaked in major tax consultancy breach - here's what we know
techradar.com·1d
🔓Hacking
Quicksilver v2: evolution of a globally distributed key-value store (Part 1)
blog.cloudflare.com·11h
💿ZFS Internals
Iceberg, the Right Idea – The Wrong Spec – Part 2 of 2: The Spec
database-doctor.com·1d·
Discuss: Hacker News
🔧KAITAI
Loading...Loading more...
AboutBlogChangelogRoadmap