Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80168
posts in
292.2
ms
Real world
scenario
of
refactoring
legacy code to strategy & chain of responsibility patterns
dev.to
·
15h
·
Discuss:
DEV
✨
Code Quality
How I Approach a System I Have Never Seen Before
dev.to
·
1d
·
Discuss:
DEV
🔧
System Design
Mastering
User Settings in
SharePoint
Framework
devblogs.microsoft.com
·
3d
🔌
API Design
AI Can
Easily
Crack Your
Passwords
– Tips to Create Strong
Passwords
maketecheasier.com
·
4d
✨
Code Quality
Trust-Centered Digital Products Through Secure Design — Lessons Informed by Suzanne
Alipourian-Frascogna
future.forem.com
·
4d
·
Discuss:
DEV
🏗
Software Architecture
Introduction
devguard.org
·
4d
✨
Code Quality
Going Through
Snowden
Documents
, Part 1
libroot.org
·
2d
·
Discuss:
Lobsters
💻
Software Engineering
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
3d
·
Discuss:
Hacker News
,
r/programming
🏗
Software Architecture
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
4d
☁️
Cloud Computing
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
·
3d
·
Discuss:
Hacker News
🏗
Software Architecture
Securing
Hardware
For The Quantum Era
semiengineering.com
·
4d
🔧
System Design
Vibecoding
Audit
erik.wiffin.com
·
4d
·
Discuss:
Hacker News
✨
Code Quality
Boost LLM Security: automated Red
Teaming
at Scale with
Promptfoo
blog.nviso.eu
·
4d
✨
Code Quality
Private Data Space Model
privatedata.space
·
5d
🔵
Go
Cisco
is
Proud
to Champion the UK’s Software Security Code of Practice
blogs.cisco.com
·
6d
💻
Software Engineering
Sammā
Suit – Open-source security armor for AI agents (all 8 layers
enforced
)
sammasuit.com
·
3d
·
Discuss:
Hacker News
🏗
Software Architecture
CySecurity
News - Latest Information Security and Hacking Incidents:
Orchid
Security Launches Tool to Monitor Identity Behavior Across Business Applications
cysecurity.news
·
4d
·
Discuss:
Blogger
🏗
Software Architecture
ERC-8004
: A
Trustless
Agent Standard for On-Chain AI in Avalanche C-Chain
medium.com
·
2d
🔧
System Design
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
5d
🔧
System Design
CySecurity
News - Latest Information Security and Hacking
Incidents
: A New Twist on Old Cyber Tricks
cysecurity.news
·
1d
·
Discuss:
Blogger
💻
Software Engineering
Loading...
Loading more...
« Page 14
•
Page 16 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help