🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
💥 Cyberattack
SoupDealer Technical Analysis of a Stealthy Java Loader Used in Phishing Campaigns
malwation.com·1d
🦹cybercrime
St. Paul doesn’t pay ransom for cyberattack
startribune.com·1h
🦹cybercrime
11th August – Threat Intelligence Report
research.checkpoint.com·12h
🦹cybercrime
US Judiciary System says it was hacked, is taking steps to strengthen cybersecurity
techradar.com·10h
🦹cybercrime
AI Threats: Facing Smart Cyber Attacks Today
dev.to·2d·
Discuss: DEV
🦹cybercrime
MedusaLocker ransomware group is looking for pentesters
securityaffairs.com·18h
🦹cybercrime
Hashing and Salting Passwords in C#
dev.to·20h·
Discuss: DEV
🦹cybercrime
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
bleepingcomputer.com·2h·
Discuss: Hacker News
🦹cybercrime
Claude is competitive with humans in (some) cyber competitions
red.anthropic.com·1d·
Discuss: Hacker News
🦹cybercrime
New Embargo group may be a rebranded version of ALPHV ransomware gang
metacurity.com·11h
🦹cybercrime
Website asks me to choose the name of someone I’ve “recently been in contact with” as a security question when trying to change my password, and it lists someon...
reddit.com·18h·
Discuss: r/privacy
🦹cybercrime
0click Enterprise compromise – thank you, AI! (WHY2025)
cdn.media.ccc.de·1d
🦹cybercrime
It's the certificates, stupid!
reverse.put.as·2h
🦹cybercrime
Nevada Supreme Court sides with Jon Gruden in case vs. NFL, blocking arbitration
nytimes.com·1h
🦹cybercrime
RediGuard: AI-Powered Real-Time Security Monitoring with Redis 8
youtu.be·1d·
Discuss: DEV
🦹cybercrime
Cyber Incident Response Needs Dynamic Command Structure Instead of Static Guidelines
blogger.com·1d
🦹cybercrime
BlackSuit Ransomware Takes an Infrastructure Hit From Law Enforcement
darkreading.com·4h
🦹cybercrime
Breaking Language Barriers Through Multilingual Domains
aei.org·15h
🦹cybercrime
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
unit42.paloaltonetworks.com·15h
🔍Cyber threat intelligence
Understanding CSRF and How to Prevent It in Your Application — Part 1
infosecwriteups.com·2d
🦹cybercrime
Loading...Loading more...
AboutBlogChangelogRoadmap