Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
182762
posts in
46.5
ms
Mile
Bluff
Medical Center says security incident that involved data encryption
disrupted
phone, computer systems
🔒
Security
malware.news
·
3d
RSME
: A Reactive Stability
Mutation
Encryption Algorithm for Active Defense and Lightweight Cybersecurity
🌊
Stream Ciphers
zenodo.org
·
15h
·
Hacker News
Hacking
Policy for the Public Good
🔓
Hacking
youtube.com
·
2d
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
🔐
Encryption
github.com
·
15h
·
r/rust
Privacy-first mind
mapping
app. Part 3:
Encryption
Model
🔐
Quantum Security
mindmapvault.com
·
2d
·
DEV
How Strong is the
FO-Calypse
, Really?
Instantiating
Plaintext-Checking Oracles against Masked Software Implementations of ML-KEM
🔐
Post-Quantum Crypto
eprint.iacr.org
·
6d
Why We Actually Need End-to-End
Encryption
🔐
Encryption
javvadmalik.com
·
6d
CortexOS-App/CortexOS-crypto-core
: Cryptographic core of
CortexOS
-
Argon2id
key derivation, AES-256-GCM encryption, and zero-knowledge vault. Published for security transparency.
🛡️
macOS Security
github.com
·
2d
·
r/opensource
Zero-knowledge
text
encryption
inside any web app
🔐
Encryption
lockisecurity.com
·
5d
·
Hacker News
When Wi-Fi Encryption Fails:
Protecting
Your Enterprise from
AirSnitch
Attacks
📶
Wireless Security
unit42.paloaltonetworks.com
·
4d
The Quantum Threat to Encryption: Why
Lattice
Cryptography
is Your New Best Friend
🔐
Quantum Security
infosecwriteups.com
·
6d
Kyber
ransomware gang
toys
with post-quantum encryption on Windows
🎫
Kerberos Exploitation
bleepingcomputer.com
·
4d
Discret
11, the French TV encryption of the 80s (
fabiensanglard.net
)
🔐
Cryptographic Archaeology
fabiensanglard.net
·
5d
·
Hacker News
Microsoft
taps
Anthropic’s
Mythos
to strengthen secure software development
🔬
Anthropic
infoworld.com
·
3d
eidolmor/hacker-terminal-game
: A terminal-based cybersecurity training game built in Python
📟
Terminals
github.com
·
3d
·
DEV
Towards a
Field-Informed
Risk-Based Framework for
PQC
Migration in Legacy Systems
🔐
Post-Quantum Crypto
eprint.iacr.org
·
5d
Batch-Puncturing
Circuit
CP-ABE
(and More) from Lattices
🌊
Stream Ciphers
eprint.iacr.org
·
6d
What companies should do before quantum
computers
break today's
encryption
🔐
Quantum Security
youtube.com
·
5d
·
Hacker News
Mile
Bluff
Medical Center says security incident that involved data encryption
disrupted
phone, computer systems
🔒
Information Security
databreaches.net
·
3d
Microsoft
taps
Anthropic’s
Mythos
to strengthen secure software development
🔬
Anthropic
csoonline.com
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help