Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🚨 Incident Response
Security Operations, Threat Detection, Forensics, SOC
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18117
posts in
27.3
ms
Threat Intel &
Containment
🎯
Threat Intelligence
medium.com
·
3d
·
…
Building AI-Powered
Incident
Management for Healthcare
APIs
using .NET
🔍
Detection Engineering
dev.to
·
51m
·
DEV
·
…
I
ran
incident response on my own homelab. Here's the
postmortem
.
🚧
Execution Guardrails
stevenjvik.tech
·
12h
·
DEV
·
…
When Customer-Facing Systems Fail: How Incident Response and
Observability
Reduce
MTTR
👁️
Observability
devops.com
·
1d
·
…
Reliability Is Security: Why
SRE
Teams Are Becoming the
Frontline
of Cloud Defense
🔧
SRE
dzone.com
·
1d
·
…
When a single
pane
of glass becomes a one-way
mirror
[Q&A]
📦
Sandboxing
betanews.com
·
19h
·
…
Building a SOC Lab From Scratch (Part 2): Windows
Telemetry
& Threat Detection with
Sysmon
🔍
Detection Engineering
medium.com
·
6d
·
…
AWS
Incident
Response:
SecurityAudit
Access
🚧
Execution Guardrails
docs.aws.amazon.com
·
2d
·
DEV
·
…
Cyber
Insights
2026: Threat
Hunting
in an Age of Automation and AI
🔎
threat hunting
medium.com
·
2d
·
…
CYBERDUDEBIVASH
Sentinel
APEX™ — Building a Real-Time AI Cyber Threat Intelligence Platform from…
🎯
Threat Intelligence
cyberdudebivash.medium.com
·
5d
·
…
ilflow4592/agent-forensics
: Black box for AI agents — capture decisions, generate forensic reports for EU AI Act compliance
📋
AGENTS.md
github.com
·
5d
·
DEV
,
r/Python
·
…
No SIEM, No Problem: Forensic Investigation of a Recent
Trivy
Supply Chain Compromise with
RSigma
🪟
ETW Patching
tigerdata.com
·
6d
·
…
When Your AI Agent Has an
Incident
, Your
Runbook
Isn't Ready
🎼
Agent Orchestration
dev.to
·
12h
·
DEV
·
…
Teleport
Report Finds Over-Privileged AI Systems Linked to
Fourfold
Rise in Security Incidents
⚖️
AI Governance
infoq.com
·
4d
·
…
Building a
Deterministic
Event
Correlation
Engine in Go for High-Volume Alert Systems
⏱️
Durable Execution
dzone.com
·
1d
·
…
Securing the
Unseen
: IoT
Visibility
and Edge Protection
🔍
eBPF
dev.to
·
8h
·
DEV
·
…
Meta S
Rogue
Ai Agent
Sev
1 Breach Playbook For Engineering Ops And Security
📋
AGENTS.md
dev.to
·
1d
·
DEV
·
…
Open Source
Incident
Management: Why It
Matters
🏗️
Infrastructure-as-Code
dev.to
·
2d
·
DEV
·
…
Event-Driven Threat Detection: Building Real-Time Security on
Conditional
Access
Gaps
🚧
Execution Guardrails
dev.to
·
6d
·
DEV
·
…
Root
Cause Analysis: The Complete Guide for
SREs
🌪️
Chaos Engineering
dev.to
·
6d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help