🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Vector Smuggling

Embedding Exfiltration, Covert Channels, Data Hiding, ML Security

How to Prove That An Email Was Received
metaspike.com·4h
📄Document Digitization
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.com·16h
🎯Threat Hunting
Security Advisory: Anthropic's Slack MCP Server Vulnerable to Data Exfiltration
embracethered.com·1d·
Discuss: Hacker News
🔓Hacking
Show HN: Requests-Based Google Maps Scraper
apify.com·3h·
Discuss: Hacker News
🔍BitFunnel
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.com·7h·
Discuss: Substack
🔓Hacking
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.to·20h·
Discuss: DEV
🎵Spectral Hashing
Week 25 – 2025
thisweekin4n6.com·3d
🌐WARC Forensics
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·2d
🔒Language-based security
Show HN: Towards agentic Graph RAG: Enhancing graph retrieval with vector search
blog.kuzudb.com·2h·
Discuss: Hacker News
📊Graph Databases
Shadow defense against gradient inversion attack in federated learning
arxiv.org·2d
🔒Privacy Preserving
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
Fully lifted \emph{blirp} interpolation -- a large deviation view
arxiv.org·20h
🌀Fractal Compression
A novel approach to password-auth without sharing the password to server
danieltan.weblog.lol·1d·
Discuss: Hacker News
🎯NTLM Attacks
Show HN: TableSprint- Supabase alternative with vibe coding features
tablesprint.com·21h·
Discuss: Hacker News
📲Digitization
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·10h·
Discuss: DEV
🧠Machine Learning
Russia-linked APT28 use Signal chats to target Ukraine official with malware
securityaffairs.com·1d
🎫Kerberos Exploitation
Amplifying Machine Learning Attacks Through Strategic Compositions
arxiv.org·1d
⚔️Lean Tactics
Meta's V-JEPA 2 Aims to Redefine AI's Spatial Reasoning Without Video Data
gazeon.site·7h·
Discuss: Hacker News
🔲Cellular Automata
AMF-MedIT: An Efficient Align-Modulation-Fusion Framework for Medical Image-Tabular Data
arxiv.org·20h
🤖Advanced OCR
Why ‘TRUST-NO-ONE’ Is Your Strongest Defense
infosecwriteups.com·15h
🌐Network Security
Loading...Loading more...
AboutBlogChangelogRoadmap