🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ•΅οΈ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs
arxiv.orgΒ·1d
πŸ’»Local LLMs
China-linked Silk Typhoon APT targets North America
securityaffairs.comΒ·4h
πŸ”“Hacking
RTTY Art Historical Archives
rtty.comΒ·2hΒ·
Discuss: Hacker News
πŸ” Terminal Fonts
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·22h
πŸ”Cryptographic Archaeology
US military wants to secure the internet by making it more quantum
newscientist.comΒ·20h
βš›οΈQuantum Tape
Anamorpher: visual multi-modal prompt injection via image-scaling attacks
github.comΒ·3hΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comΒ·1d
πŸ“ŸTerminal Forensics
Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·21hΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comΒ·23h
πŸ”“Hacking
Spiral-Bench shows which AI models most strongly reinforce users' delusional thinking
the-decoder.comΒ·3h
🧠Intelligence Compression
Stop Calling It OSINT
dutchosintguy.comΒ·1d
πŸ”ŽOSINT Techniques
πŸš€ I Created OctaneDB – The Lightning-Fast Python Vector Database!
dev.toΒ·6hΒ·
Discuss: DEV
πŸ—‚οΈVector Databases
Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
tenable.comΒ·1d
πŸ”“Hacking
Navy Sailor Convicted of Espionage, photographing blueprints & thousands of pages of technical information
bastille.netΒ·1d
πŸ“ŸTerminal Forensics
Robots in the skies (and they use Transformer models)
stackoverflow.blogΒ·20h
πŸ”Vector Forensics
MCP Security Risks Multiply With Each New Agent Connection
thenewstack.ioΒ·18h
πŸ§ͺProtocol Fuzzing
The ABCs of β€œβ€‘ishing”: From Phishing to Quishing
bitsight.comΒ·1d
🎯Threat Hunting
Attackers claim they hacked Nissan's design studio and stole 4TB of data
techradar.comΒ·22h
πŸ”“Hacking
Show HN: Novel GPT-2 sampling and memory architecture
github.comΒ·4hΒ·
Discuss: Hacker News
πŸ’ŽInformation Crystallography
AI breakthroughs are transforming industries, from healthcare to finance
blog.googleΒ·18h
πŸ€–AI Curation
Loading...Loading more...
AboutBlogChangelogRoadmap