🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
👁️ Surveillance Detection

Countersurveillance, Tradecraft, Physical Security, Operational Security

Meta introduces new tools to help identify scam messages on WhatsApp
9to5mac.com·13h
🛸Paranormal
Radshield: Software Radiation Protection for Commodity Hardware in Space
radshield.github.io·7h·
Discuss: Hacker News
🛩️Drone Warfare
Serving Indigenous communities with high-speed Internet through monsoons and desert
blog.apnic.net·1d
🧭Wilderness Navigation
‘A million calls an hour’: Israel relying on Microsoft cloud for expansive surveillance of Palestinians
theguardian.com·14h·
Discuss: Hacker News, r/news
🛰️Satellite Intelligence
CSIS Launches Commission on Cyber Force Generation
csis.org·1d·
Discuss: Hacker News
⚔️Gray Zone Warfare
How to Trace and Audit Evidentiary Force in Machine-drafted Text
hackernoon.com·19h
🔍Intelligence Analysis
Cybersecurity Instruction Tuned Model
huggingface.co·1d·
Discuss: Hacker News
🗝️Lock Picking
How Ethical Hackers Use Termux for Reconnaissance
dev.to·1d·
Discuss: DEV
🚪Escape Routes
No Backdoors. No Kill Switches. No Spyware.
blogs.nvidia.com·1d·
Discuss: Hacker News, r/hardware
🛩️Drone Warfare
SpyCloud Enhances Investigations Solution with AI-Powered Insights – Revolutionizing Insider Threat and Cybercrime Analysis
devops.com·13h
📡Signal Intelligence
Self-Navigated Residual Mamba for Universal Industrial Anomaly Detection
arxiv.org·1d
🛰️Satellite Intelligence
Understanding Information Gain: Choosing the Right Questions
dev.to·23h·
Discuss: DEV
🔍Intelligence Analysis
Anthropic Adds Auto Security Reviews to Claude Code
thenewstack.io·9h
💻CLI Tools
Want a four-channel dashcam for less than $200? I recommend this one
androidauthority.com·14h
🐾Tracking Skills
Hackers Use 4G-Connected Raspberry Pi to Breach Bank’s ATM Network
blogger.com·8h
🕵OSINT
New Research on HEVC Video Double Encoding Detection Published in Journal of Imaging
blog.ampedsoftware.com·11h
🕵OSINT
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.org·1d
🛩️Drone Warfare
VexTrio Cybercrime Outfit Run by Legit Ad Tech Firms
darkreading.com·5h
🛩️Drone Warfare
In Cybersecurity, We Have to Work Together
tenable.com·1d
⚔️Gray Zone Warfare
c/side CEO and Co-founder Simon Wijckmans on The Importance of Browser-side Security
hackernoon.com·16h
🚪Escape Routes
Loading...Loading more...
AboutBlogChangelogRoadmap