Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Cybersecurity
Network Security, Threats, Best Practices, Ethical Hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7993
posts in
18.7
ms
Cybersecurity Deep
Dive
: The Complete Guide to
Protecting
Modern Applications
🛡️
Security Type Systems
medium.com
·
4d
CritBench
: A Framework for Evaluating Cybersecurity Capabilities of Large Language Models in
IEC
61850 Digital Substation Environments
🏰
Capability Machines
arxiv.org
·
2d
How AI Has Turned
Cybersecurity
From Defense to
Offense
🛡️
Security Type Systems
pub.towardsai.net
·
16h
ETSI
EN 304 223 Securing Artificial Intelligence (SAI);
Baseline
Cyber Security Requirements for AI Models and Systems
🧠
Symbolic AI
etsi.org
·
1d
After fighting
malware
for decades, this cybersecurity veteran is now
hacking
drones
🌐
Network Security
techcrunch.com
·
5d
·
Hacker News
Cybersecurity
in the Age of
Instant
Software
🛡️
Security Type Systems
schneier.com
·
2d
·
Hacker News
Hackers Are
Posting
the Claude Code Leak With Bonus
Malware
🛡️
Penetration Testing
wired.com
·
6d
Hackers or
Hallucinators
? A Comprehensive Analysis of LLM-Based Automated
Penetration
Testing
🛡️
Penetration Testing
arxiv.org
·
2d
delve
fabricated 494 reports. but even the "real" SOC 2
pentests
are mostly theater.
🛡️
Penetration Testing
codeant.ai
·
1d
·
r/sysadmin
A.I. Is on Its Way to
Upending
Cybersecurity
🎯
Taint Analysis
nytimes.com
·
3d
·
Hacker News
Friday Archaeology: A Quarter-Century-Old Crypto Library, the Cult of the Dead Cow, and a
Rijndael
Buffer
Overwrite
🔓
Binary Exploitation
llama.gs
·
6d
·
Hacker News
Blockchain and AI:
Securing
Intelligent
Networks for the Future
🏗️
System Design
arxiv.org
·
1d
Mr. Robot Hacking
Wiki
- Complete Technical
Reference
🛡️
Penetration Testing
joasantonio.com
·
5d
Towards the Development of an LLM-Based
Methodology
for Automated Security
Profiling
in Compliance with Ukrainian Cybersecurity Regulations
🎮
Language Ergonomics
arxiv.org
·
1d
What AI Really Means for Cybersecurity — An
Architect
’s
Honest
View
🧠
Symbolic AI
pub.towardsai.net
·
3d
Astrosp/Awesome-OSINT-For-Everything
: OSINT tools for Information gathering, Cybersecurity, Reverse searching, bugbounty, trust and safety, red team
oprations
and more.
🛡️
Security Type Systems
github.com
·
5d
The
Axios
supply chain attack used
individually
targeted social engineering
🛡️
Penetration Testing
simonwillison.net
·
6d
·
Lobsters
,
Hacker News
,
r/javascript
,
r/webdev
Penetration
Testing Contract Agreement (Beginner-Friendly Guide + Open
Template
)
🛡️
Penetration Testing
medium.com
·
4d
NetSecBed
: A Container-Native
Testbed
for Reproducible Cybersecurity Experimentation
🛡️
Capability VMs
arxiv.org
·
3d
Mapping the
Exploitation
Surface: A 10,000-Trial
Taxonomy
of What Makes LLM Agents Exploit Vulnerabilities
🛡️
Security Type Systems
arxiv.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help