๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ‡ธ๐Ÿ‡ช Swedish Cryptanalysis

Nordic Cipher History, Scandinavian Security, Regional Cryptography, Historical Analysis

Saleae Analyzer for the BDM protocol
zetier.comยท18h
๐Ÿ”ฌBinary Analysis
Vikings were captivated by silver โ€“ our new analysis of their precious loot reveals how far they travelled to get it
theconversation.comยท1dยท
Discuss: Hacker News
๐ŸฐMedieval Networks
Florence + the Machine โ€“ Everybody scream
popmuzik.seยท1h
๐ŸŽจSwedish Demoscene
Prepping the Front Line for MFA Social Engineering Attacks
darkreading.comยท3h
๐Ÿ•ต๏ธPenetration Testing
Teenager who planned mosque attack in Scotland detained for 10 years
theguardian.comยท4h
๐ŸŽจSwedish Design Philosophy
Machine Learning-Based AES Key Recovery via Side-Channel Analysis on the ASCAD Dataset
arxiv.orgยท2d
๐Ÿ”Vector Forensics
Dozens more UK Afghan data breaches uncovered
bbc.comยท12h
๐Ÿ”Polish Cryptanalysis
Russian cyber group exploits seven-year-old network vulnerabilities for long-term espionage
cyberscoop.comยท1d
๐Ÿ•ต๏ธPenetration Testing
Swedish PM: Sweden prepared to back a Ukraine peace deal with security support
sverigesradio.seยท1d
๐Ÿ‡ธSweden
Threat Intelligence Executive Report โ€“ Volume 2025, Number 4
news.sophos.comยท1d
๐ŸŽฏThreat Hunting
Herb Sutter "Three Cool Things in C++26"
herbsutter.comยท1dยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Orange Belgium mega-breach exposes 850K customers to serious fraud
theregister.comยท3h
๐Ÿ”“Hacking
Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comยท7h
๐ŸŒDNS Security
Why spotting a liar can be harder than you think
phys.orgยท49m
๐Ÿ’ฟDAT Forensics
Untangling complex cybersecurity stacks in a supercharged risk environment
techradar.comยท1d
๐Ÿ›กCybersecurity
US CERT/CC warns of flaws in Workhorse Software accounting software used by hundreds of municipalities in Wisconsin
securityaffairs.comยท10h
๐Ÿ”CBOR
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท6h
๐Ÿ›ก๏ธCLI Security
Optimizing multiprecision LLL in FLINT
fredrikj.netยท17h
๐ŸงฎAlgebraic Datatypes
Playing With Fire - Are Russia's hybrid attacks the new European war?
investigations.news-exchange.ebu.chยท2dยท
Discuss: Hacker News
๐Ÿ”Polish Cryptanalysis
How Hackers Use ChatGPT for Cybersecurity โšก
infosecwriteups.comยท21h
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap