Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Threat Modeling
STRIDE, Attack Surface, MITRE ATT&CK, Red Team
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19996
posts in
33.9
ms
API Security in 2026: The Attack Surface Your
Pentest
Is
Probably
Missing
☁️
Cloud Security
dev.to
·
4d
·
DEV
Attack Selection In Agentic AI Control
Evals
Can
Decrease
Safety
🛡️
AI Security
lesswrong.com
·
10h
inferwall/inferwall
: AI application firewall for LLM-powered apps — multi-layered detection (heuristic, ML classifier, semantic, LLM-judge) against prompt injection,
jailbreaks
, and data leakage
🚧
Execution Guardrails
github.com
·
1d
·
DEV
APT37
Expands Attack Surface Using Social Platforms and
Tampered
Installers
🕵️
APT Attribution
medium.com
·
1d
Enterprise Java Applications: A
Practical
Guide to
Securing
Enterprise Applications with a Risk-Driven Architecture
📦
Sandboxing
dzone.com
·
6d
Always-on AI Agents put everything
hackers
could ever want behind a single attack
surface
🛡️
AI Security
techradar.com
·
6d
Building a Loan
Defaulter
Risk
Assessment
Platform at Scale
💳
Payment Systems
dev.to
·
6h
·
DEV
Shrinking the
IAM
Attack Surface through Identity Visibility and Intelligence Platforms (
IVIP
)
🎯
Threat Intelligence
thehackernews.com
·
6d
CNN Spatial Behavior Explained:
Convolution
, Stride,
Padding
, and Output Size (With Intuition)
👁️
Computer Vision
zeromathai.com
·
3d
·
DEV
How I Built an
OCR-Based
Defense Against Prompt
Injection
for Local LLM Search
🔍
Detection Engineering
dev.to
·
2d
·
DEV
Claude
Mythos
:
Prepare
for your board’s cybersecurity questions about the latest AI model from Anthropic
🛡️
AI Security
tenable.com
·
7h
APT37
’s
Pretexting-Based
Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
🕵️
APT Attribution
malware.news
·
2d
From Field Notes to
Foundation
:
Structuring
Data for AI-Powered Reports
💬
NLP
dev.to
·
18h
·
DEV
Week 15
🎯
Threat Intelligence
thisweekin4n6.com
·
2d
RST
TI Report Digest: 13
Apr
2026
🎯
Threat Intelligence
medium.com
·
1d
Threat Intelligence vs. Threat
Hunting
🔎
threat hunting
medium.com
·
1d
Ten
New AI Security
Vendors
🎯
Threat Intelligence
stiennon.substack.com
·
4d
·
Substack
Stop
Sending
Your Security
Alerts
to Cloud AI — Build Local LLM Tools Instead
🦙
Ollama
dev.to
·
2d
·
DEV
claudlos/hermes-katana
: State of the art security for AI agents
🚧
Execution Guardrails
github.com
·
2d
SecurityMetrics
Uncovers a 700 Site Global
Skimming
Operation
🍯
Deception Technology
medium.com
·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help