Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Cybersecurity
State Actors, Critical Infrastructure, Espionage
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
21706
posts in
27.5
ms
The National
Cyber
Strategy for America: 3
takeaways
for government security leaders
elastic.co
·
3d
🔒
Network Security
APT40
and Australia: The Risk of a State-Backed
Espionage
to the Australian Government Sector
zsyaimaa.medium.com
·
3d
🎯
Threat Intelligence
Proof
over promises: a new
doctrine
for cybersecurity
techradar.com
·
19h
🔐
Zero Trust
NATO allies are
linking
their
defenses
together to better hunt and kill drones on its eastern edge
businessinsider.com
·
21h
📻
Information Warfare
AI and quantum computing
reshape
the global cybersecurity
landscape
oodaloop.com
·
2d
⚛️
Quantum Computing
Chinese Hackers Target Southeast Asian Militaries with
AppleChris
and
MemFun
Malware
thehackernews.com
·
1d
·
Discuss:
r/pwnhub
⚔️
Offensive Secuity
Digest
of Recent
Articles
on Just Security (Mar. 8-13, 2026)
justsecurity.org
·
22h
🚨
Incident Response
Cybersecurity
101 What's an
Exploit
dev.to
·
1d
·
Discuss:
DEV
💥
Binary Exploitation
Europe’s
Defensive
Security
Measures
against Chinese Technologies
blogs.lse.ac.uk
·
4d
🗽
Technology Sovereignty
Less-relevant results
The critical infrastructure that’s so
vital
to Middle East nations – and
vulnerable
to Iranian attack
independent.co.uk
·
5d
⚡
Energy Security
tomvaillant/osint-tool-database
huggingface.co
·
17h
🕵️
OSINT
France: National
Cybersecurity
Agency Reports
Ransomware
Attack Drop in 2025
infosecurity-magazine.com
·
3d
🔒
Security
Claude API
Circuit
Breaker
Pattern: Enterprise Resilience
sitepoint.com
·
1d
🌪️
Chaos Engineering
States Have an Important Role to Play in
Countering
CCP
Infiltration
nationalreview.com
·
2d
🏛️
State Governance
Memetic
Warfare
Reading Corner
memeticwarfare.io
·
1d
📢
Semiotic Warfare
Cybersecurity
M&A
Roundup
: 30 Deals Announced in December 2025
malware.news
·
5d
🔓
Vulnerability Research
From Kyiv to
Taipei
: Three
Theatres
, Much to Learn. The Big Five, 15 March edition.
mickryan.substack.com
·
5h
·
Discuss:
Substack
🗺️
Proxy Wars
DoJ dismantles botnet made of 360,000 infected routers and IOT devices spread across 163 countries that ran for 16 years —
SocksEscort
proxy network eliminated in joint operation with
Europol
tomshardware.com
·
22h
🦈
Wireshark
New
PRC
Cybercrime Law
Heralds
Digital Iron Curtain
jamestown.substack.com
·
1d
·
Discuss:
Substack
🔒
Network Security
Cybercrime
isn't just a cover for Iran's government
goons
- it's a key part of their operations
theregister.com
·
4d
·
Discuss:
Hacker News
🍯
Deception Technology
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help