๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ•ต๏ธ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

Detecting and countering misuse of AI: August 2025
anthropic.comยท15hยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Privacy-Preserving Federated Learning Framework for Risk-Based Adaptive Authentication
arxiv.orgยท11h
๐ŸคSecure Multiparty
Data Is the New Diamond: Heists in the Digital Age
unit42.paloaltonetworks.comยท16h
๐ŸŽฏThreat Hunting
China linked Silk Typhoon targeted diplomats by hijacking web traffic
securityaffairs.comยท8h
๐Ÿ”“Hacking
Binary Exploitation 101 - Introduction
r1ru.github.ioยท1d
๐Ÿ“ผCassette Hacking
Hook Android Trojan Now Delivers Ransomware-Style Attacks
darkreading.comยท21h
๐Ÿ”“Hacking
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
bastille.netยท1d
๐Ÿ“กNetwork Monitoring
(็นไธญ) The Art of PHP โ€” My CTF Journey and Untold Stories!
blog.orange.twยท13h
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Itโ€™s a Cold Day in Developer Hell, So I Must Roll My Own Crypto
soatok.blogยท4h
๐ŸŒณArchive Merkle Trees
Security Chat 6.0: A Night of Ideas, Innovation, and Community in Zurich
raffy.chยท2h
๐ŸŽฏThreat Hunting
Positional Embeddings in Transformers: A Math Guide to RoPE & ALiBi
towardsdatascience.comยท1d
๐Ÿ“Geometric Hashing
ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies
research.checkpoint.comยท1d
๐Ÿ’ฃZIP Vulnerabilities
A neat idea, but I can see this leading to the Balkanization of the Internet
boston.conman.orgยท1d
๐Ÿ›กCybersecurity
Reversing a (not-so-) Simple Rust Loader | cxiao.net
cxiao.netยท1d
๐Ÿฆ€Rust Macros
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization
arxiv.orgยท1d
๐Ÿ–ผ๏ธJPEG Forensics
Phishing Kits Uncovered: Methods and Tactics Used to Evade SEGs, Sandboxes, and Analysts
cofense.comยท10h
๐ŸŽซKerberos Exploitation
"The entire internet is broken": ethical hacking expert John Hammond meets James Kettle
portswigger.netยท6h
๐Ÿ”“Hacking
Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference
cacm.acm.orgยท10m
๐ŸŒNetwork Security
Anthropic says cybercriminals used its Claude AI for 'vibe hacking'
businessinsider.comยท2h
๐Ÿ”“Hacking
InfoSec News Nuggets 8/26/2025
aboutdfir.comยท1d
๐Ÿ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap