🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
arxiv.org·1d
💻Local LLMs
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·14h·
Discuss: Hacker News
🔐Cryptographic Archaeology
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.com·1d
📟Terminal Forensics
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.com·15h
🔐Cryptographic Archaeology
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.com·16h
🔓Hacking
US military wants to secure the internet by making it more quantum
newscientist.com·13h
⚛️Quantum Tape
FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage
securityaffairs.com·1d
🔓Hacking
Weaponizing image scaling against production AI systems
blog.trailofbits.com·1d·
Discuss: Hacker News, r/LocalLLaMA, r/programming
🧪Binary Fuzzing
Stop Calling It OSINT
dutchosintguy.com·21h
🔎OSINT Techniques
Navy Sailor Convicted of Espionage, photographing blueprints & thousands of pages of technical information
bastille.net·1d
📟Terminal Forensics
Attackers claim they hacked Nissan's design studio and stole 4TB of data
techradar.com·15h
🔓Hacking
AI breakthroughs are transforming industries, from healthcare to finance
blog.google·11h
🤖AI Curation
Robots in the skies (and they use Transformer models)
stackoverflow.blog·14h
🔍Vector Forensics
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.com·17h
🔓Hacking
The ABCs of “‑ishing”: From Phishing to Quishing
bitsight.com·1d
🎯Threat Hunting
MCP Security Risks Multiply With Each New Agent Connection
thenewstack.io·11h
🧪Protocol Fuzzing
My ex stalked me, so I joined a 'dating safety' app. Then my address was leaked
bbc.com·6h
📡RSS
YouTube’s Sneaky AI ‘Experiment’
theatlantic.com·12h
🤖AI Curation
The AI Breakthrough You Can't Ignore: Finally, a Personalized Privacy Policy That Wins Trust (and Saves You a Fortune).
dev.to·18h·
Discuss: DEV
🚀Indie Hacking
Exploiting API4 — 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)
lab.wallarm.com·19h
⚡gRPC
Loading...Loading more...
AboutBlogChangelogRoadmap