Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🧱 Firewalls
Network Security, Packet Filtering, Access Control, iptables
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
182619
posts in
49.4
ms
The Shadow Chain (Part II): PowerShell, SSL/TLS, and the Art of
Bypassing
Corporate
Firewalls
🌐
DNS Security
medium.com
·
2d
Router Security
Hardening
Steps for 2026: From Default Credential
Audits
to Automated Firmware Risk Monitoring
🔒
Network Security
itsecurityguru.org
·
4d
meseretak/hng-stage3
📟
Firmware Analysis
github.com
·
19h
·
DEV
Would You Pay $60 For A Browser? (ft.
Firewalls
Don't Stop
Dragons
)
🏠
Self-hosting
discuss.privacyguides.net
·
2d
Experience AI-Powered Check Point
Firewall
at Google Cloud Next
☁️
Cloud Security
blog.checkpoint.com
·
4d
Anthropic Tool Access, EU App
Bypasses
, and
Active
Zero-Days
🏺
Kerberos Archaeology
bishopfox.com
·
2d
Behind Closed Doors -
Bypassing
RFID
Readers & Physical Access Controls
🚧
Execution Guardrails
youtube.com
·
2d
ABAC
:
Attribute-Based
Access Control
🔑
Capability-based Security
medium.com
·
6d
DORA
and operational resilience:
Credential
management as a financial risk control
🔐
Security Patterns
bleepingcomputer.com
·
2d
Batch-Puncturing
Circuit
CP-ABE
(and More) from Lattices
🌊
Stream Ciphers
eprint.iacr.org
·
6d
Kubernetes v1.36: Fine-Grained
Kubelet
API Authorization
Graduates
to GA
☸️
K8S
kubernetes.io
·
2d
Breaking a Kubernetes Service in Three Ways and
Examining
the Raw
Packets
☸️
K8S
tylerjarjoura.com
·
3d
·
Hacker News
US, UK agencies warn hackers were hiding on
Cisco
firewalls
long after patches were applied
🔓
Hacking
cyberscoop.com
·
3d
Kubernetes
v1.36
enhances
security and AI support
⚓
Kubernetes
techzine.eu
·
4d
Arch Linux Makes
nft
the Default Backend for
iptables
🔥
nftables
linuxtoday.com
·
5d
$800
Bounty
: Privilege Escalation via API — From
Scheduler
to Team Admin
🎭
Token Impersonation
infosecwriteups.com
·
4d
OffSec
’s
Exploit
Database Archive
🌐
Web Exploits
exploit-db.com
·
5d
How Network Security
Assessments
Saved
Businesses from Cyber Attacks
🔒
Network Security
medium.com
·
4d
Would You Pay $60 For A Browser? (ft.
Firewalls
Don't Stop
Dragons
)
🔒
Web Security
discuss.privacyguides.net
·
3d
From Access Control to
Outcome
Control:
Securing
AI Agents with Check Point and Google Cloud
🏛
Sovereign AI Infrastructure
blog.checkpoint.com
·
4d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help