🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Threat Hunting

Proactive Detection, Behavioral Analysis, IOC Development, Attack Patterns

Monibot - Server and Application Monitoring
monibot.io·1d
👁️Observatory Systems
AWS Deep Dives – SES (Simple Email Service)
blog.localstack.cloud·4h·
Discuss: Hacker News
🔄Sync Engine
Escaping the chains of tethered products: the Juice Rescue project
natematias.com·6h·
Discuss: Hacker News
📼Cassette Protocols
Google's Liquid Cooling at Hot Chips 2025
chipsandcheese.com·4h·
Discuss: Hacker News
🖥️Modern Terminals
A German ISP tampered with their DNS – specifically to sabotage my website
lina.sh·12h·
Discuss: Lobsters, Hacker News
🛣️BGP Hijacking
Building your first MCP server: How to extend AI tools with custom capabilities
github.blog·2d
⚔️Lean Tactics
How to model the world? Introduction to Laplace Neuron
abibulic.github.io·5d·
Discuss: Hacker News, Hacker News
🔲Cellular Automata
The Hierarchical Reasoning Model
jdsemrau.substack.com·4d·
Discuss: Substack
🔲Cellular Automata
Denormalization: Making Your Database Faster (and Why It’s a Trade-Off) day 35 of system design basics
dev.to·1d·
Discuss: DEV
🗄️Database Internals
Cohere unveils Command A Reasoning, a model for enterprise research and workflows
the-decoder.com·2d
🎙️Whisper
My Journey with PySpark: Why Every Data Engineer Should Learn It
dev.to·9h·
Discuss: DEV
🌊Apache Kafka
How AI agents, synthetic data, and executive literacy build resilient organizations
techradar.com·3d
🌍Cultural Algorithms
Shared starter template config and CLAUDE.md memory bank system for Claude Code
github.com·2d·
Discuss: Hacker News
🦀Rust Macros
ReviseMate: Exploring Contextual Support for Digesting STEM Paper Reviews
arxiv.org·2d
🔬Academic Search
R-ConstraintBench: Evaluating LLMs on NP-Complete Scheduling
arxiv.org·2d
🧮SMT Solvers
LLM4Sweat: A Trustworthy Large Language Model for Hyperhidrosis Support
arxiv.org·2d
🎙️Whisper
SEO is dead, RAO just doesn’t know it yet
dev.to·8h·
Discuss: DEV
📡RSS Automation
GeMS: Efficient Gaussian Splatting for Extreme Motion Blur
arxiv.org·3d
🏺Computational Archaeology
Patching for persistence: How DripDropper Linux malware moves through the cloud
redcanary.com·5d
🔓Hacking
Windsurf: Memory-Persistent Data Exfiltration (SpAIware Exploit)
embracethered.com·2d
🧠Memory Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap