Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Threat Modeling
STRIDE, Attack Surface, MITRE ATT&CK, Red Team
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
22686
posts in
15.1
ms
Friendly Fire in the
Frontend
: How Vibe Coding is
Sabotaging
Your Security Architecture
dev.to
·
7h
·
Discuss:
DEV
🛡️
AI Security
How I Built a
MITRE
ATT&
CK
Threat Mapping Dashboard in Python
medium.com
·
3d
🎯
Threat Intelligence
The Zero-Day
Scramble
is
Avoidable
: A Guide to Attack Surface Reduction
thehackernews.com
·
2d
💥
Exploit Dev
The MCP Attack Surface: 4 Threat
Vectors
Every AI Developer
Misses
botguard.dev
·
2d
·
Discuss:
DEV
🛡️
AI Security
Translating risk insights into
actionable
protection: leveling up security
posture
with Cloudflare and Mastercard
blog.cloudflare.com
·
3d
🔒
Network Security
Introducing
OpenTide
Threat Surface: One Unified
Vocabulary
to Describe Where Threats Land
blog.opentide.org
·
3d
🔎
threat hunting
Agentic
AI Is Breaking Your Attack
Surface
: A Complete Threat Model for 2026
dev.to
·
3d
·
Discuss:
DEV
🛡️
AI Security
Can models gradient hack
SFT
elicitation
?
lesswrong.com
·
1d
🐛
Fuzzing
This one’s for you,
Mom
blog.talosintelligence.com
·
11h
🔎
threat hunting
Why Your Threat Intelligence Platform Is
Giving
You Data
threatlandscape-io.medium.com
·
18h
🎯
Threat Intelligence
Securing
consumer devices for
classified
use
aspistrategist.org.au
·
2d
🔒
Security
Six Android Malware Families Target
Pix
Payments, Banking Apps, and Crypto
Wallets
thehackernews.com
·
21h
🦠
Malware Analysis
Rogue
AI agents can work together to hack systems and
steal
secrets
theregister.com
·
6h
🛡️
AI Security
Bitdefender
Threat
Debrief
malware.news
·
2d
🦠
Malware
Less-relevant results
Essential
Techniques
for Production
Vector
Search Systems, Part 4:
Multi-Vector
Search
dzone.com
·
17h
🔢
NumPy
When
E-commerce
Systems Send
Mixed
Signals
inc.com
·
17h
🍯
Deception Technology
Is the US military actually
afraid
of Claude? A new theory of why Anthropic was
labeled
a supply chain risk.
garymarcus.substack.com
·
9h
·
Discuss:
Substack
🎭
Anthropic Claude
[Paper] When can we trust
untrusted
monitoring? A safety case sketch across
collusion
strategies
lesswrong.com
·
2d
🎯
Threat Intelligence
I built a free Threat Intelligence API in
Python/Flask
– ML-based IP
reputation
scoring
rapidapi.com
·
14h
·
Discuss:
DEV
🎯
Threat Intelligence
How to Build an Autonomous AI Agent with
n8n
and
Decapod
freecodecamp.org
·
1d
✍️
Prompt Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help