🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

The AI Crash That Isn’t: A Reality Check from the Trenches
julsimon.medium.com·2d
🖥️Terminal Renaissance
Gaining Traction in the Gov Space
5iprojects.com·1d·
Discuss: Hacker News
🎯Threat Hunting
Google Improves Gemini AI Image Editing With 'Nano Banana' Model
slashdot.org·3h
🧠Learned Codecs
Margaux Blanchard, the fake AI journalist
dispatch-media.com·11h·
Discuss: Hacker News
📰RSS Reading Practices
Hyper-Wordle strategies
chriskw.xyz·2d·
Discuss: Hacker News
🌳Trie Structures
Evasive Salty 2FA phishing framework targets multiple 2FA methods
scworld.com·2d·
Discuss: Hacker News
🎫Kerberos Attacks
Google Messages Is Testing a New Way to Verify Who You’re Chatting With
lifehacker.com·1d
📜Proof Carrying Code
Built a full-stack QR code app with auth in 15 minutes using InstantDB
news.ycombinator.com·21m·
Discuss: Hacker News
📱QR Archaeology
Hundreds of Salesforce customers impacted by attack spree linked to third-party AI agent
cyberscoop.com·5h
🎫Kerberos Attacks
Pong Cloned by Neural Network
hackaday.com·2d·
Discuss: Hacker News
🎮Gameboy Emulation
Mechanical memory: The clever strategy cells use to move through narrow environments
phys.org·7h
🔲Cellular Automata
TokenUnify: Scaling Up Autoregressive Pretraining for Neuron Segmentation
arxiv.org·22h
🧠Machine Learning
Generating Synthetic Contrast-Enhanced Chest CT Images from Non-Contrast Scans Using Slice-Consistent Brownian Bridge Diffusion Network
arxiv.org·22h
🌀Fractal Compression
vLLM on x86: Because Not Everyone Can Afford a GPU Cluster
dev.to·15h·
Discuss: DEV
⚡Homebrew CPUs
When It’s Acceptable to Be on Speakerphone in Public
newyorker.com·16h
🎵Audio Steganography
Supervised Learning: A Focus on Classification
dev.to·1d·
Discuss: DEV
🧠Machine Learning
Security Affairs newsletter Round 538 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·2d
🛡Cybersecurity
Malicious Scanning Waves Slam Remote Desktop Services
darkreading.com·6h
🔓Hacking
Building Personal Agents, Not General Agents? — Meland’s Reflection on Individual Value in the AI Era
dev.to·1d·
Discuss: DEV
🤖AI Curation
AI Product Value Assessment Model: An Interdisciplinary Integration Based on Information Theory, Economics, and Psychology
arxiv.org·22h
🧠Intelligence Compression
Loading...Loading more...
AboutBlogChangelogRoadmap