🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Steganography

Hidden Data, Audio Watermarking, Image Embedding, Covert Channels

Chinese SMS Spammers Go Mobile
garwarner.blogspot.com·21h·
Discuss: garwarner.blogspot.com
🕵️Vector Smuggling
Threat Bulletin: Fire in the Woods – A New Variant of FireWood
intezer.com·21h
🌳Archive Merkle Trees
Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability
welivesecurity.com·3d
💣ZIP Vulnerabilities
How Randomness Improves Algorithms?
quantamagazine.org·43m·
Discuss: Hacker News
🌳Trie Structures
Using sound to remember quantum information 30 times longer
phys.org·17h·
Discuss: Hacker News
⚛️Quantum Tape
Using Metadata to find Paul Revere (2013)
kieranhealy.org·7h·
Discuss: Hacker News
📡DNS Archaeology
NEURAL: Attention-Guided Pruning for Unified Multimodal Resource-Constrained Clinical Evaluation
arxiv.org·6h
🧠Machine Learning
Critical FortiSIEM flaw under active exploitation, Fortinet warns
securityaffairs.com·16h
🛡Cybersecurity
Running Guitar Effects on a PlayStation Portable
hackaday.com·1d
🎵Gameboy Sound
Show HN: Enter your domain and my open-source agent will hack it
github.com·2d·
Discuss: Hacker News, r/SoftwareEngineering
🎫Kerberos Exploitation
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System
usenix.org·1d
🛡️RISC-V Security
Network Time Protocol (NTP) Abuse for Enterprise Recon
infosecwriteups.com·4h
🎫Kerberos Exploitation
FOBNN: Fast Oblivious Inference via Binarized Neural Networks
arxiv.org·2d
🔢Binary Embeddings
DeBackdoor: A Deductive Framework for Detecting Backdoor Attacks on Deep Models with Limited Data
usenix.org·1d
🔍Vector Forensics
Ethical Medical Image Synthesis
arxiv.org·6h
⚖️Emulation Ethics
That 16 Billion Password Story (AKA "Data Troll")
troyhunt.com·14h·
Discuss: Lobsters, Hacker News
🔓Hacking
Dynamic Thermal Bridging Mitigation via Adaptive Metamaterial Grading
dev.to·8h·
Discuss: DEV
🧮Algorithmic Cooking
URL Inspection Tasks: Helping Users Detect Phishing Links in Emails
usenix.org·1d
🌐WARC Forensics
Go's Data Structures: A Deep Dive into Arrays and Slices
dev.to·4h·
Discuss: DEV
⚡Cache Theory
An Encryption Algorithm
dev.to·3d·
Discuss: DEV
🔐Homomorphic Encryption
Loading...Loading more...
AboutBlogChangelogRoadmap