Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ OSINT
Specific
open source intelligence, investigative research, data gathering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17733
posts in
126.2
ms
What Critical Infrastructure
Teaches
Us About
Enduring
OSINT Capability
🔒
Cybersecurity
osintcombine.com
·
2d
·
…
Tranquility
AI and
Fivecast
Turn OSINT Into Real-Time Intelligence Workflows
🎯
Threat Intelligence
osint.org
·
6d
·
…
The
Hacker
’s Greatest
Weapon
: Trust
🍯
Deception Technology
banerjeeduke.medium.com
·
2d
·
…
Threat Intelligence Tools: A Hands-On
TryHackMe
Walkthrough
🎯
Threat Intelligence
medium.com
·
4d
·
…
European
Union/Poland
•
Frontex
hit by new anti-corruption investigation
🕵️
Investigative OSINT
intelligenceonline.com
·
1d
·
…
AWS-native
incident
investigation
PoC
🌪️
Chaos Engineering
lnkd.in
·
2d
·
DEV
·
…
I built an AI tool for
incident
investigation (looking for
honest
feedback)
🚨
Incident Response
dev.to
·
6d
·
DEV
·
…
Chainalysis
adds 'natural language' AI agents to its
blockchain
investigation platform
⛓️
LangChain
coindesk.com
·
2d
·
…
Threat Intel &
Containment
🎯
Threat Intelligence
medium.com
·
4d
·
…
In the U.S. Strike on an
Iranian
School, What a
Serious
Military Investigation Should Look Like
🔍
Intelligence Failure
justsecurity.org
·
2d
·
…
CYBERDUDEBIVASH
Sentinel
APEX™ — Building a Real-Time AI Cyber Threat Intelligence Platform from…
🎯
Threat Intelligence
cyberdudebivash.medium.com
·
5d
·
…
Telegram Channel Monitor Gets
Keyword
Scanning
and Archive Search
🦈
Wireshark
osintteam.blog
·
6d
·
…
Phishing
Email Analysis: A
SOC-Based
Investigation Using Open-Source Intelligence Tools
🕵️
Investigative OSINT
medium.com
·
6d
·
…
Rewinding
the Breach: a
CSIRT-CTI-Investigation
🔍
DFIR
malware.news
·
6d
·
…
Claude Code's New Cybersecurity
Guardrails
: How to Keep Your Security Research
Flowing
🔓
Vulnerability Research
gentic.news
·
4d
·
DEV
·
…
No SIEM, No Problem: Forensic Investigation of a Recent
Trivy
Supply Chain Compromise with
RSigma
🪟
ETW Patching
tigerdata.com
·
6d
·
…
IRCTC
Typosquatting
Exposed: Inside the Deceptive Ad Trap at
ircts
[.]co[.]in
📢
Semiotic Warfare
hackhalt.medium.com
·
6d
·
…
Model Context Protocol and Amazon
Bedrock
: Building a Digital
Forensics
Assistant
🔧
MCP
dev.to
·
6d
·
DEV
·
…
The most
useful
command
in the age of agentic
🤖
Agentic AI
dev.to
·
6d
·
DEV
·
…
EDR/XDR
Bypass and Detection Evasion Techniques: An Investigation of Advanced Evasion Strategies from a Red Team Perspective
⚔️
Offensive Secuity
dev.to
·
6d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help