🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Threat Hunting

Proactive Detection, Behavioral Analysis, IOC Development, Attack Patterns

Enhanced Web Server Log Anomaly Detection via Multi-Modal Fusion & Predictive Reinforcement Learning
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“Log Parsing
LongCat-Flash, a language model with 560B total parameters, MoE architecture
github.comΒ·3hΒ·
Discuss: Hacker News
πŸ“ŠCount-Min Sketch
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
darkreading.comΒ·1d
πŸ”“Hacking
Cloudy Summarizations of Email Detections: Beta Announcement
blog.cloudflare.comΒ·1d
πŸ“‘Feed Security
An Online Group Claims It’s Behind Campus Swatting Wave
nytimes.comΒ·12h
🚨Incident Response
Got no signal? This devious cyberattack can downgrade your phone from 5G to 4G without you knowing
techradar.comΒ·10h
πŸ“‘Network Monitoring
UNC6395 Expands Data Theft Campaign to Email OAuth Tokens
decipher.scΒ·1d
πŸ”“Hacking
Cybersecurity Snapshot: Agentic AI Security in Focus With Anthropic’s Chilling Abuse Disclosure and CSA’s New Identity Protection Framework
tenable.comΒ·1d
πŸ”“Hacking
When technology is not enough: Insights from a pilot cybersecurity culture assessment in a safety-critical industrial organisation
arxiv.orgΒ·2d
πŸ›‘Cybersecurity
Securing the AI "Before Times”
paloaltonetworks.comΒ·2d
πŸ”Capability Systems
The Business of Malware: Inside the MaaS Economy
bitsight.comΒ·2d
🦠Malware Analysis
From Hours to Seconds: Vision 3.0 Transforms Phishing Incident Response
cofense.comΒ·3d
🏺Kerberos Archaeology
WAF through the eyes of hackers (2019)
habr.comΒ·1dΒ·
Discuss: Hacker News
πŸ”’Language-based security
Subliminal Learning Lets Student AI Models Learn Unexpected (and Sometimes Misaligned) Traits from Their Teachers
scientificamerican.comΒ·1d
πŸ”²Cellular Automata
Reliable Weak-to-Strong Monitoring of LLM Agents
arxiv.orgΒ·3d
πŸ”’Language-based security
The Power of Digital Twins in Cybersecurity
cacm.acm.orgΒ·3d
πŸ”Capability Systems
Automated Conflict Risk Stratification via Socio-Technical Network Analysis and Bayesian Learning
dev.toΒ·1dΒ·
Discuss: DEV
🌍Cultural Algorithms
AgentHopper: An AI Virus Research Project
embracethered.comΒ·1d
🏠Homelab Pentesting
Building Resilience and Advancing Cybersecurity Capability Maturity
optiv.comΒ·2d
πŸ”Capability Systems
Experts warn of actively exploited FreePBX zero-day
securityaffairs.comΒ·1d
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap