🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

Emera: Too High Valuation Reflects The Recent Florida Entry
seekingalpha.com·6h
⚡HTMX
PMM support for na_game_tool
codecs.multimedia.cx·8h
🕸️WASM Archives
Recommended email providers • Cory Dransfeldt
coryd.dev·1d
🏠Personal Archives
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
securityscorecard.com·2d
🕵️Penetration Testing
Sci-fi interfaces | IxD Lessons from Sci-Fi
scifiinterfaces.com·20h
🏛Digital humanities
Reverse Engineering the Microchip CLB Part 1: Background and Reverse Engineering the BLEs
mcp-clb.markomo.me·1d·
Discuss: Lobsters, Hacker News, r/embedded
🔬Binary Analysis
I built a network-wide IPv6 DDNS updater — finds hosts by MAC and syncs DNS without touching the end device
github.com·9h·
Discuss: r/homelab
🌐DNS over QUIC
Meta Beats Copyright Suit From Authors Over AI Training on Books
tech.slashdot.org·2d
🏷️Metadata Standards
Tech Firms Warn 'Scattered Spider' Hacks Are Targeting Aviation Sector
it.slashdot.org·22m
🔓Hacking
Echo Chamber: A Context-Poisoning Jailbreak That Bypasses LLM Guardrails
neuraltrust.ai·3d·
Discuss: Hacker News
🧪CBOR Fuzzing
Build Your Own Clone: Best Open-Source AI Tools
dev.to·12h·
Discuss: DEV
🚀Indie Hacking
I Went to the MLH x Google Gemini AI Roadshow
dev.to·49m·
Discuss: DEV
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Uncovering Hidden Violent Tendencies in LLMs: A Demographic Analysis via Behavioral Vignettes
arxiv.org·22h
🧠Intelligence Compression
Charming Kitten APT Tries Spying on Israeli Cybersecurity Experts
darkreading.com·1d
🎫Kerberos Attacks
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·3d
🔢Bitwise Algorithms
'CitrixBleed 2' Shows Signs of Active Exploitation
darkreading.com·7h
📦Container Security
Implementing Multi-tenancy with Keycloak and NestJS
dev.to·3h·
Discuss: DEV
🏺Kerberos Archaeology
OctoThinker: Mid-training Incentivizes Reinforcement Learning Scaling
arxiv.org·1d
🔲Cellular Automata
scMamba: A Scalable Foundation Model for Single-Cell Multi-Omics Integration Beyond Highly Variable Feature Selection
arxiv.org·22h
🧠Machine Learning
North Korea - Cyber Threat Actor Profile
cstromblad.com·2d
🇸🇪Nordic Cryptography
Loading...Loading more...
AboutBlogChangelogRoadmap