๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

BURN: Backdoor Unlearning via Adversarial Boundary Analysis
arxiv.orgยท1d
๐Ÿฆ Malware Analysis
On A.I. Video Watermarks
pxlnv.comยท6h
๐ŸŒŠAudio Watermarks
Konfety Returns: Classic Mobile Threat with New Evasion Techniques
zimperium.comยท21h
๐Ÿฆ Malware Analysis
A Minimal DDPM
github.comยท8hยท
Discuss: Hacker News
๐Ÿง Machine Learning
Ex-US soldier who Googled 'can hacking be treason' pleads guilty to extortion
theregister.comยท12h
๐Ÿ”“Hacking
FSociety Hits APSCON2025 IEEE Registration Database in Multi-Level Cyberattack
leakd.comยท17hยท
Discuss: Hacker News
๐Ÿ”Homomorphic Encryption
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท1d
๐Ÿ”Cryptographic Archaeology
Itโ€™s Not What You Pay, Itโ€™s How Fast You Play: A History of MEV
hackernoon.comยท18h
๐Ÿ–ฅ๏ธTerminal Renaissance
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.comยท10hยท
Discuss: Lobsters, Hacker News
๐Ÿ›ก๏ธeBPF Security
How Criminal Networks Exploit Insider Vulnerabilities
darkreading.comยท20h
๐Ÿ”“Hacking
Chinese authorities are using a new tool to hack seized phones and extract data
techcrunch.comยท48m
๐Ÿ”“Hacking
Risky Bulletin: Microsoft blocks filesystem redirection attacks in new security feature
news.risky.bizยท6h
๐Ÿ”“Hacking
How I Doubled My Lookup Performance with a Bitwise Trick
maltsev.spaceยท14h
๐Ÿ”ขBitwise Algorithms
Students, here are 5 key things to know when learning how to train large language models
techradar.comยท17h
๐Ÿ’ปLocal LLMs
Unsupervised Learning NO. 489
newsletter.danielmiessler.comยท1d
๐Ÿ—œ๏ธLZW Variants
MCP: A Practical Security Blueprint for Developers
thenewstack.ioยท14h
๐Ÿ”“Hacking
Android Malware Konfety evolves with ZIP manipulation and dynamic loading
securityaffairs.comยท17h
๐ŸบZIP Archaeology
Will the internet heal itself?
aardvark.co.nzยท1d
๐Ÿ•ธ๏ธMesh Networks
3S-Attack: Spatial, Spectral and Semantic Invisible Backdoor Attack Against DNN Models
arxiv.orgยท6h
๐ŸŒDNS Security
Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup
eccc.weizmann.ac.ilยท13hยท
Discuss: Hacker News
๐ŸŽฏInteractive Provers
Loading...Loading more...
AboutBlogChangelogRoadmap