🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Swedish Cryptanalysis

Nordic Cipher History, Scandinavian Security, Regional Cryptography, Historical Analysis

Threat Analysis - Public Administration - May -> July of 2025
cstromblad.com·22h
🕵️Penetration Testing
Zuckerberg bygger hemligt AI-labb för miljarder
omni.se·1d
🇸🇪Nordic Algorithms
Are Cyber Defenders Winning? – Lawfare
lawfaremedia.org·4h·
Discuss: Hacker News
🎯Threat Hunting
Concrete Security Bounds for Simulation-Based Proofs of Multi-Party Computation Protocols
arxiv.org·1d
🎯Performance Proofs
OTW - Bandit Level 0 to Level 1
tbhaxor.com·2h
🛡️CLI Security
Hack The Box Academy Writeup — PASSWORD ATTACKS — Writing Custom Wordlists and Rules
infosecwriteups.com·3h
🔓Password Cracking
On This Day in Math - August 1
pballew.blogspot.com·2h·
Discuss: www.blogger.com
🍎Apple Computing
C++ Instrumentation with Memory Sanitizer
systemsandco.dev·2h·
Discuss: Hacker News
🔓Decompilation
2025 Unit 42 Global Incident Response Report: Social Engineering Edition
unit42.paloaltonetworks.com·1d
🔓Hacking
Strategic Minerals and Strategic Memory: Can the Global North Compete Without Repeating History?
kkrva.se·1d
⚙️Swedish Assembly
Cracking the code: resilient defense and rapid recovery
techradar.com·17h
💾Persistence Strategies
Why we need better software identification
softwareheritage.org·17h
🔗Binary Similarity
The Kremlin's Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
wired.com·15h·
Discuss: r/technews
🔓Hacking
Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations
forensicfocus.com·15h
🚨Incident Response
Free Hacking Ebooks and Security Ebooks Download Links
blackmoreops.com·17h
🔓Hacking
Encrypted Client Hello Approved for Publication
feistyduck.com·20h·
Discuss: Hacker News
🌐NetworkProtocols
Footnotes, Gödel exercises, Purcell
logicmatters.net·18h
👑Isabelle
What the Coinbase Breach Says About Insider Risk
darkreading.com·17h
🔓Hacking
Top spy says LinkedIn profiles that list defence work 'recklessly invite attention of foreign intelligence services'
theregister.com·1h
🔓Hacking
Read more: Swiss scientists reveal the complex craft of prehistoric tattooing
swissinfo.ch·23h
🏺Computational Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap