Feeds to Scour
SubscribedAll
Scoured 9587 posts in 1.80 s
Securing Legacy Android Apps: Modern Encryption Practices
thenewstack.ioΒ·1d
πŸ”Cryptographic Archaeology
Preview
Report Post
TrafficLLM: Why LLMs Are Becoming Essential for Encrypted Network Traffic Analysis
dev.toΒ·12hΒ·
Discuss: DEV
πŸ•΅οΈNetwork Forensics
Preview
Report Post
LangChain core vulnerability allows prompt injection and data exposure
securityaffairs.comΒ·2h
🌐DNS Security
Preview
Report Post
Anticipating Risk Before It Hits: Surbhi Gupta on the Future of Predictive Analytics
hackernoon.comΒ·2d
πŸ”BitFunnel
Preview
Report Post
Tackling Unmaintainable Complexity with Automation: Building a Multi-Tenant SaaS Solo
ko-chan.github.ioΒ·5hΒ·
Discuss: DEV
πŸ”Capability Systems
Preview
Report Post
Pro-Russian hackers claim cyberattack on French postal service
the-independent.comΒ·3d
πŸ”Soviet Cryptography
Preview
Report Post
Building the World's First Cryptographic Audit Trail for MetaTrader: A Deep Technical Dive
dev.toΒ·13hΒ·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
Rebus
en.wikipedia.orgΒ·4dΒ·
Discuss: Hacker News
πŸ–‹Typography
Preview
Report Post
GateBreaker: Gate-Guided Attacks on Mixture-of-Expert LLMs
arxiv.orgΒ·2d
πŸ’»Local LLMs
Preview
Report Post
Evasive Panda APT poisons DNS requests to deliver MgBot
securelist.comΒ·3d
🌐DNS Security
Preview
Report Post
The networks, politics and research behind visualising historic environments [Elektronisk resurs]
libris.kb.seΒ·5d
🎭Cultural Informatics
Preview
Report Post
The 3% Rule: How To Silence 97% of Your Cloud Alerts and Be More Secure
tenable.comΒ·4d
🎯Threat Hunting
Preview
Report Post
pokiSEC: A Multi-Architecture, Containerized Ephemeral Malware Detonation Sandbox
arxiv.orgΒ·2d
πŸ“¦Container Security
Preview
Report Post
A new maritime security architecture for the UK and her neighbours
ft.com
Β·6d
πŸ”Swedish Cryptography
Preview
Report Post
Book Review: Code, Chips and Control - The Security Posture of Digital Isolation by Sal Kimmich
shkspr.mobiΒ·5dΒ·
Discuss: shkspr.mobi
πŸ”—Hash Chains
Preview
Report Post
Understanding the ForgeRock Password Storage Scheme (2024)
fusionauth.ioΒ·4dΒ·
Discuss: Hacker News
πŸ”“Password Cracking
Preview
Report Post
22nd December – Threat Intelligence Report - Check Point Research
research.checkpoint.comΒ·5d
πŸ”“Hacking
Preview
Report Post
Electronic Commerce: The Future of Fraud (1998)
schneier.comΒ·5dΒ·
Discuss: Hacker News
🌳Archive Merkle Trees
Preview
Report Post
ISADM: An Integrated STRIDE, ATT&CK, and D3FEND Model for Threat Modeling Against Real-world Adversaries
arxiv.orgΒ·4d
🎯Threat Hunting
Preview
Report Post