Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Evasion Techniques
AV evasion, EDR bypass, payload obfuscation, defense evasion
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17005
posts in
28.3
ms
Securing the
Unseen
: IoT
Visibility
and Edge Protection
🔍
eBPF
dev.to
·
4d
·
DEV
·
…
Deepfakes and malware: AI menu grows longer for threat actors, causing
headaches
for
defenders
🛡️
AI Security
siliconangle.com
·
2d
·
…
Qilin
and
Warlock
Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
👁️
SIEM Evasion
thehackernews.com
·
3h
·
…
The invisible threat hidden in clear view: how
Unicode
characters are being
weaponized
to hide malicious commands from human users
🚧
Execution Guardrails
techradar.com
·
2d
·
…
Building an
Authentication
System With Express
JWT
: A Step-by-Step Guide
🔑
Cryptography
jumpcloud.com
·
5d
·
DEV
·
…
How
Phishing
Websites Trick Users and How to
Detect
Them
🍯
Deception Technology
scamalerts.com
·
2d
·
DEV
·
…
April 4, 2026
🪟
ETW Patching
the grugq's newsletter via buttondown.com
·
1d
·
…
The
democratisation
of business email
compromise
fraud
🍯
Deception Technology
malware.news
·
3d
·
…
Rebuilding
TLS
, Part 2 — Adding Integrity to the Channel
🔑
Cryptography
dev.to
·
16h
·
DEV
·
…
Qilin
EDR
killer infection chain
🪟
ETW Patching
blog.talosintelligence.com
·
4d
·
…
Last Week in Security (
LWiS
)
🪟
ETW Patching
blog.badsectorlabs.com
·
6d
·
…
New Phishing Platform Used in
Credential
Theft Campaigns Against C-Suite
Execs
🎟️
Kerberos Attacks
infosecurity-magazine.com
·
3d
·
…
Shielding
Your LLMs: A Deep Dive into Prompt Injection &
Jailbreak
Defense
🧠
Context Engineering
dev.to
·
17h
·
DEV
·
…
DEW
#150 - macOS Endpoint Security Firewall,
EDR
telemetry updates & Supply Chain Bonanza
🎯
Threat Intelligence
detectionengineering.net
·
5d
·
…
Phishing
Attempts
vs
Phishing
Systems
🍯
Deception Technology
medium.com
·
6d
·
…
Takedown
is not a ticket, but a
campaign-suppression
system
🎫
ADCS Attacks
dev.to
·
3h
·
DEV
·
…
Application
abuse
and what to do about it [Q&A]
🚧
Execution Guardrails
betanews.com
·
3d
·
…
Weekly Threat Intelligence Report 30
Mar
2026
🎯
Threat Intelligence
medium.com
·
3d
·
…
Retaliatory
AI Security: Make Your Tools Play
Offence
🛡️
AI Security
medium.com
·
6d
·
…
Malicious
Skills Exposed — Threat
Breakdown
🔎
threat hunting
dev.to
·
2d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help