Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Threat Modeling
Security Architecture, Risk Assessment, STRIDE, Attack Surface
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200635
posts in
35.0
ms
Shostack
Threat
Modeling
Guide
🔐
Security
binaryphile.com
·
4d
MATRA
: Modeling the Attack Surface of Agentic AI Systems --
OpenClaw
Case Study
🤖
Game AI
arxiv.org
·
2d
Stop
Chasing
Threats: Top 3 Insights from the SANS Attack
Surface
Management Survey
🔧
Vulnerability Management
blog.qualys.com
·
11h
How
Mergers
and
Acquisitions
Expand Your Attack Surface Overnight
🤝
Mergers & Acquisitions
flashpoint.io
·
6h
Salesforce
API Attack Surface: A Practical
Recon
Guide
📈
Growth Hacking
osintteam.blog
·
1d
AI,
Adversaries
, and the Modern Attack Surface: Why Continuous Security
Validation
Can’t Wait
🛡️
AI Security
guidepointsecurity.com
·
3d
Moving
from Theory to Action in AI Risk Management
🛡️
AI Safety
partnershiponai.org
·
12h
AI’s
Double-Edged
Sword
: Innovation, Risk, and the Expanding Attack Surface
🤖
AI Technology
odsc.medium.com
·
2d
Growing Internet-Facing Systems Expand Attack
Surfaces
and Slow
Remediation
🛡️
Network Security
petri.com
·
13h
Complexity Creates Risk: Why
Simpler
Infrastructure Is
Safer
Infrastructure
🔄
Infrastructure Interdependency
fshot.org
·
2d
·
Hacker News
The attack surface
moved
inside the agent. So did
Arcjet
.
🚧
Execution Guardrails
thenewstack.io
·
4d
Ishikawa
: 10 years of building an attack surface
mapping
tool I can't release
💣
Binary Exploitation
blog.laughingman.dev
·
2d
·
Hacker News
Aurora® Attack Surface Management
Für
Technologieunternehmen
🔧
Vulnerability Management
malware.news
·
2d
Beyond source code: The files AI coding agents trust — and
attackers
exploit
🛡️
AI Security
cloud.google.com
·
2d
Context-Aware Web Attack Detection in Open-Source
SIEM
Systems via
MITRE
ATT&CK-Enriched Behavioral Profiling
🔍
Detection Engineering
arxiv.org
·
22h
Evaluating the
Reliability
of Multiple Large Language Models in Risk Assessment: A
CIS
Controls Based Approach
🛡️
AI Safety
arxiv.org
·
6d
Autonomous
Adversary
:
Red-Teaming
in the age of LLM
⚙️
LLMOps
arxiv.org
·
6d
What Will Happen Next: Large Models-Driven
Deduction
for Emergency
Instances
✨
Effect Handlers
arxiv.org
·
2d
Usability
as a Weapon:
Attacking
the Safety of LLM-Based Code Generation via
Usability
Requirements
🧠
Context Engineering
arxiv.org
·
2d
Heimdallr
:
Characterizing
and Detecting LLM-Induced Security Risks in GitHub CI Workflows
🔒
Runtime Security
arxiv.org
·
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help