🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Protocol Forensics

Network Archaeology, Historical Standards, Communication Evolution, Wire Analysis

Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
sentinelone.com·1d
🎫Kerberos Attacks
pfSense CE 2.8.1 Maintenance Release Now Available
discoverbsd.com·9h
🛡️eBPF Security
Default Web Content
blackhillsinfosec.com·2d
🛡️Security Headers
Resilient by Design: Network Security for the Next Disruption
blog.checkpoint.com·1d
🌐Network Security
socfortress/Wazuh-Rules
github.com·16h
📻Homebrew Protocols
ChatGPT’s new branching feature is a good reminder that AI chatbots aren’t people
arstechnica.com·2h
🎙️Whisper
Show HN: I built a tool that turns cryptography papers into working Python code
paperstoapp.com·1d·
Discuss: Hacker News
🔗Hash Chains
Strategies for securing non-human identities (services, workloads, AI agents)
cerbos.dev·6h·
Discuss: Hacker News, r/programming
🎯Threat Hunting
In the rush to adopt hot new tech, security is often forgotten. AI is no exception
theregister.com·3d·
Discuss: Hacker News
🛣️BGP Hijacking
Stop Burning Money on Performance Firefighting
blog.platformatic.dev·1d·
Discuss: Hacker News, r/webdev
⚡Performance Tools
Python Programs for Industrial Fence Threat Visualization
dev.to·21h·
Discuss: DEV
🎯Threat Hunting
Evaluating Security Properties in the Execution of Quantum Circuits
arxiv.org·1d
⚛️Quantum Compilers
A Tiny 6G Chip Could Make Your Wireless Network 500x Faster
popularmechanics.com·1d
🖥️Hardware Architecture
FastCaps: A Design Methodology for Accelerating Capsule Network on Field Programmable Gate Arrays
arxiv.org·1d
🖥️Hardware Architecture
Conference Hopping: Training Attendee Scanning Def Con
blogs.cisco.com·2d
🎯Threat Hunting
Real-Time OT Anomaly Detection via Hyperdimensional Federated Learning and Symbolic Reasoning
dev.to·1d·
Discuss: DEV
👁️Observatory Systems
GPS Spoofing Attacks on Automated Frequency Coordination System in Wi-Fi 6E and Beyond
arxiv.org·1d
📡Bluetooth Archaeology
How Bitcoin Uses Hashes and Digital Signatures to Keep Transactions Honest
hackernoon.com·2d
🔗Hash Chains
Observing Dapr with OpenTelemetry and Dash0
dash0.com·1d·
Discuss: Hacker News
👁️System Observability
Digest #178: GitHub Secrets Leak, Building an AI Server, Docker→Kubernetes and ArgoCD Anti-Patterns
devopsbulletin.com·2h
❄️Nix Flakes
Loading...Loading more...
AboutBlogChangelogRoadmap