🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Cyber security
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
A No-BS Guide to Networking
perseuslynx.dev
·
2d
·
Discuss:
Hacker News
,
r/selfhosted
🕵
Threat intelligence
Why Metadata Matters (2013)
eff.org
·
1d
·
Discuss:
Hacker News
🕵
Threat intelligence
Project Hydra: Improving state resolution in Matrix
matrix.org
·
1d
·
Discuss:
Lobsters
,
Hacker News
🕵
Threat intelligence
One Country For Old Men: Desperate ICE Drops Age Cap For New Hires
techdirt.com
·
1d
🕵
Threat intelligence
Trump Has Dropped a Third of All Government Investigations Into Big Tech
404media.co
·
8h
🕵
Threat intelligence
Title: New SMS Text Message Fraud Operation Emerges in the Wake of a Prolific Scammer
dev.to
·
3d
·
Discuss:
DEV
🕵
Threat intelligence
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
pub.aimind.so
·
2d
·
Discuss:
Hacker News
,
r/LLM
🕵
Threat intelligence
Risky Bulletin: Researcher scores $250,000 for Chrome bug
news.risky.biz
·
4d
·
Discuss:
Hacker News
🕵
Threat intelligence
New downgrade attack can bypass FIDO auth in Microsoft Entra ID
bleepingcomputer.com
·
2d
·
Discuss:
Hacker News
🕵
Threat intelligence
Collective dynamics of strategic classification
arxiv.org
·
1d
🕵
Threat intelligence
Real-Time Gait Analysis & Personalized Biometrics Security SDK for Wearables
dev.to
·
1d
·
Discuss:
DEV
🤖
AI
Accelerated SQL Query Optimization via Hybrid Evolutionary-Reinforcement Learning
dev.to
·
3h
·
Discuss:
DEV
🤖
AI
AI Threats: Facing Smart Cyber Attacks Today
dev.to
·
5d
·
Discuss:
DEV
🕵
Threat intelligence
Title: The AI Revolution: Who Stands to Benefit the Most?
dev.to
·
20h
·
Discuss:
DEV
🤖
AI
Automated Anomaly Detection in Cloud Resource Configuration Utilizing Dynamic Graph Embeddings
dev.to
·
1d
·
Discuss:
DEV
🤖
AI
Combining Machine Learning Defenses without Conflicts
arxiv.org
·
17h
🤖
AI
Understanding the security landscape of MCP
dev.to
·
3d
·
Discuss:
DEV
🕵
Threat intelligence
Efficiently Verifiable Proofs of Data Attribution
arxiv.org
·
17h
🤖
AI
Show HN: CCCP – a programmable, context-aware compression protocol (early stage)
github.com
·
1d
·
Discuss:
Hacker News
🤖
AI
CarAT: Carbon Atom Tracing across Industrial Chemical Value Chains via Chemistry Language Models
arxiv.org
·
17h
🤖
AI
Loading...
Loading more...
« Page 7
•
Page 9 »