๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ Threat Hunting

Proactive Detection, Behavioral Analysis, IOC Development, Attack Patterns

OffSec Threat Hunter (OSTH): Course Review and Exam Tips
infosecwriteups.comยท58m
๐Ÿฆ Malware Analysis
Enhanced Web Server Log Anomaly Detection via Multi-Modal Fusion & Predictive Reinforcement Learning
dev.toยท1dยท
Discuss: DEV
๐Ÿ“Log Parsing
LongCat-Flash, a language model with 560B total parameters, MoE architecture
github.comยท10hยท
Discuss: Hacker News
๐Ÿ“ŠCount-Min Sketch
'Swatting' Hits a Dozen US Universities. The FBI is Investigating
yro.slashdot.orgยท4h
๐ŸšจIncident Response
Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation
darkreading.comยท1d
๐Ÿ”“Hacking
Cloudy Summarizations of Email Detections: Beta Announcement
blog.cloudflare.comยท1d
๐Ÿ“กFeed Security
SAST vs DAST vs IAST: Key Differences Explained
boostsecurity.ioยท11m
๐ŸงชProtocol Fuzzing
The Ultimate Red Team Detection Playbook: 28 KQL Queries That Will Save Your SOC
infosecwriteups.comยท58m
๐ŸŽซKerberos Exploitation
Got no signal? This devious cyberattack can downgrade your phone from 5G to 4G without you knowing
techradar.comยท17h
๐Ÿ“กNetwork Monitoring
UNC6395 Expands Data Theft Campaign to Email OAuth Tokens
decipher.scยท1d
๐Ÿ”“Hacking
Cybersecurity Snapshot: Agentic AI Security in Focus With Anthropicโ€™s Chilling Abuse Disclosure and CSAโ€™s New Identity Protection Framework
tenable.comยท1d
๐Ÿ”“Hacking
Can you trust AI to keep your secrets? Probably not, lawyers say.
businessinsider.comยท2h
๐Ÿค–AI Curation
When technology is not enough: Insights from a pilot cybersecurity culture assessment in a safety-critical industrial organisation
arxiv.orgยท2d
๐Ÿ›กCybersecurity
Securing the AI "Before Timesโ€
paloaltonetworks.comยท2d
๐Ÿ”Capability Systems
The Business of Malware: Inside the MaaS Economy
bitsight.comยท2d
๐Ÿฆ Malware Analysis
From Hours to Seconds: Vision 3.0 Transforms Phishing Incident Response
cofense.comยท3d
๐ŸบKerberos Archaeology
WAF through the eyes of hackers (2019)
habr.comยท2dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
AI agents are science fiction not yet ready for primetime
theverge.comยท21m
๐Ÿค–AI Curation
Security Affairs newsletter Round 539 by Pierluigi Paganini โ€“ INTERNATIONAL EDITION
securityaffairs.comยท6h
๐Ÿ›กCybersecurity
Reliable Weak-to-Strong Monitoring of LLM Agents
arxiv.orgยท3d
๐Ÿ”’Language-based security
Loading...Loading more...
AboutBlogChangelogRoadmap