🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Parasitic Storage

Steganographic Archives, Hidden Preservation, Covert Storage, Data Hiding

An attacker used AI to impersonate Secretary Rubio and contact high-ranking officials
the-decoder.com·25m
🕵️Vector Smuggling
Getting Started with NetExec: Streamlining Network Discovery and Access
blackhillsinfosec.com·8m
🔒LDAP Security
The AWS Survival Guide for 2025: A Field Manual for the Brave and the Bankrupt
lastweekinaws.com·8m
🖥️Self-hosted Infrastructure
Roxanne Szal: I Asked Top Election Experts About 2024 Tampering Claims
msmagazine.com·1d·
Discuss: Hacker News
🧪Protocol Fuzzing
LLMs exploit our tolerance for sloppiness
humprog.org·1d·
Discuss: Hacker News
🧠Intelligence Compression
Open-Source Security Paradox: More Code, More Validation
onekey.so·4h·
Discuss: Hacker News
🔓Open Source Software
MCNP-GO: A python package for assembling MCNP input files with a systems engineering approach
arxiv.org·10h
📦METS Packaging
Axiomatic characterizations of dissimilarity orderings and distances between sets
arxiv.org·10h
🔗Combinatory Logic
Python Fundamentals: black
dev.to·1d·
Discuss: DEV
💧Liquid Types
zkSDK: Streamlining zero-knowledge proof development through automated trace-driven ZK-backend selection
arxiv.org·10h
🧮Z3 Solver
Prompt Injection, Jailbreaking, and LLM Risks | AI Security series
dev.to·10h·
Discuss: DEV
🔓Hacking
When Data-Free Knowledge Distillation Meets Non-Transferable Teacher: Escaping Out-of-Distribution Trap is All You Need
arxiv.org·1d
💻Local LLMs
AI Agent Smart Contract Exploit Generation
arxiv.org·10h
🧪Protocol Fuzzing
CVE-2025-5777: CitrixBleed 2 Exploit Deep Dive
horizon3.ai·1d·
Discuss: Hacker News
🌐DNS Security
Adversarial Machine Learning Attacks on Financial Reporting via Maximum Violated Multi-Objective Attack
arxiv.org·10h
🔍BitFunnel
Hidden Prompts in Manuscripts Exploit AI-Assisted Peer Review
arxiv.org·10h
📄PDF Archaeology
Rectifying Adversarial Sample with Low Entropy Prior for Test-Time Defense
arxiv.org·1d
✅Verification Codecs
Think Your Business Messages Are Private? Think Again
hackernoon.com·2d
🏺Protocol Archaeology
UVOSAM: A Mask-free Paradigm for Unsupervised Video Object Segmentation via Segment Anything Model
arxiv.org·10h
🎬AV1 Encoding
South Korean Government Imposes Penalties on SK Telecom for Breach
darkreading.com·13h
🛡Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap