๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Penetration Testing

Network Security, Vulnerability Assessment, Red Team Operations, Security Auditing

Which operating system was targeted by the first ever mobile phone virus?
techspot.comยท14h
๐Ÿ”“Hacking
Microsoft Entra ID OAuth Phishing and Detections
elastic.coยท1d
๐ŸŽฏNTLM Attacks
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.devยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Show HN: Logcat.ai โ€“ AI-powered observability for Operating Systems | Free Beta
logcat.aiยท1dยท
Discuss: Hacker News
๐Ÿ”eBPF
What Is FIPS 140-3 and Why Does It Matter for Security Compliance?
securityscorecard.comยท18h
๐ŸŒณArchive Merkle Trees
Voxkryptia: A Conceptual Framework for Advanced Database Security
dev.toยท2hยท
Discuss: DEV
๐ŸงฌPostgreSQL Forensics
Easy $150: Misconfigured SSO Led to Account Takeover
infosecwriteups.comยท1d
๐Ÿ”“Hacking
Space and Satellite Security Market Forecast and Analysis
dev.toยท43mยท
Discuss: DEV
๐ŸŽฏThreat Hunting
How to Test Software in this AI Era with KaneAI
dev.toยท23hยท
Discuss: DEV
๐Ÿ”Concolic Testing
CitrixBleed 2: The nightmare that echoes the โ€˜CitrixBleedโ€™ flaw in Citrix NetScaler devices
securityaffairs.comยท1h
๐ŸŽซKerberos Attacks
10 Performance testing metrics to watch before you ship
dev.toยท1dยท
Discuss: DEV
๐Ÿ‘๏ธSystem Observability
Passwordless Auth: a JSON-Based Approach for modern authentication w/ SSSD & GNOME - DevConf.CZ 2025
youtube.comยท1h
๐Ÿ”“Password Cracking
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deยท1d
๐ŸŽซKerberos Exploitation
Fast ground penetrating radar dual-parameter full waveform inversion method accelerated by hybrid compilation of CUDA kernel function and PyTorch
arxiv.orgยท5h
โš™๏ธTape Engineering
What Is Nmap and How Can It Help Identify Network Vulnerabilities?
securityscorecard.comยท1d
๐Ÿ“กNetwork Monitoring
Vulnerability Assessment Combining CVSS Temporal Metrics and Bayesian Networks
arxiv.orgยท2d
๐Ÿ•ต๏ธDomain Enumeration
The Rise of Security Augmentation (2022)
strategyofsecurity.comยท2dยท
Discuss: Hacker News
๐Ÿ”Capability Systems
Hong Mong 5 Development Treasure Case Sharing Buried Point Development Real Battle Guide
dev.toยท11hยท
Discuss: DEV
๐Ÿ”—Data Provenance
SonicWall warns of fake VPN apps stealing user logins and putting businesses at risk - here's what we know
techradar.comยท17h
๐Ÿ”“Hacking
Educated Manticore Reemerges: Iranian Spear-Phishing Campaign Targeting High-Profile Figures
blog.checkpoint.comยท20h
๐ŸŽซKerberos Attacks
Loading...Loading more...
AboutBlogChangelogRoadmap