🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🇸🇪 Swedish Cryptanalysis

Nordic Cipher History, Scandinavian Security, Regional Cryptography, Historical Analysis

Preview: ‘Pragmata’ has an unconventional twist to the sci-fi shooter
mercurynews.com·11h
🕹️Retro Gaming
Survey says: Your dog’s name isn’t a password
yubico.com·2d
🛡Cybersecurity
Disable Console Bell Globally in DragonFly BSD
discoverbsd.com·2d
🔌Operating system internals
Reinventing Cybersecurity in the Age of AI: Collaboration is No Longer Optional
cyberthreatalliance.org·2d
🎯Threat Hunting
Spiral-Bench: A new benchmark measuring LLM sycophancy and delusion
eqbench.com·4d·
Discuss: Hacker News
🧪Binary Fuzzing
original ↗
pvk.ca·3d·
Discuss: Lobsters, Hacker News
🛡️Preservation Proofs
US Navy sailor convicted of spying for China
bbc.com·1d
🏴‍☠️Piracy
Chat Control is back and we've got two months to stop the EU CSAM scanning plans
tuta.com·3d·
Discuss: Hacker News
🔤EBCDIC Privacy
Congressman proposes bringing back letters of marque for cyber privateers
theregister.com·11h·
Discuss: Hacker News
🛡Cybersecurity
Background unclear: Great Firewall briefly cut China off from the Internet
heise.de·11h
🇨🇳Chinese Computing
Generic Reduction-Based Interpreters (Extended Version)
arxiv.org·4d
🔗Parser Combinators
DOJ takes action against 22-year-old running RapperBot Botnet
securityaffairs.com·1d
🛡Cybersecurity
DORA: six months into a resilience revolution
techradar.com·2d
🎯Threat Hunting
Enhanced Ligand Design via Multi-Modal Data Fusion and Reinforcement Learning
dev.to·9h·
Discuss: DEV
✨Effect Handlers
A New Zealand soldier admits attempted espionage in the country's first spying conviction
the-independent.com·2d
🔍Polish Cryptanalysis
Copyright Protection for Large Language Models: A Survey of Methods, Challenges, and Trends
arxiv.org·4d
🧪Archive Fuzzing
Fusing Monocular RGB Images with AIS Data to Create a 6D Pose Estimation Dataset for Marine Vessels
arxiv.org·1d
🕳️Persistent Homology
Detecting Micro-Frauds in High-Frequency Transactions with AI
dev.to·19h·
Discuss: DEV
🧮Z3 Applications
Automated Batch Release Testing via Generative Adversarial Network Validation and Anomaly Detection
dev.to·1d·
Discuss: DEV
🔤Character Classification
Cua (YC X25) Is Hiring Founding Design Engineers in SF
ycombinator.com·13h·
Discuss: Hacker News
🔌Interface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap