Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔍 Yara
Specific
YARA rules, malware signatures, pattern matching, threat detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183113
posts in
38.5
ms
The
Agentic
AI Security Company
📋
AGENTS.md
straiker.ai
·
6h
·
Hacker News
Why
Pure-LLM
CTFs
Don't Work: A Hybrid Architecture for AI Security Challenges
🛡️
LLM Security
wraith.sh
·
4d
·
r/netsec
Java
sealed
classes and
exhaustive
pattern matching
🔒
Runtime Security
neilmadden.blog
·
2d
pcrecallout
(3) Linux
Manual
Page
⚙️
Kernel Callbacks
systutorials.com
·
22h
8 Cybersecurity Websites Most
Professionals
Are
Sleeping
On (But Shouldn’t Be)
🛡️
OWASP
osintteam.blog
·
2d
Yara
Kuralları
📰
RSS Archaeology
medium.com
·
4d
DEW
#153 - New
IPv8
Draft, macOS Threat Detection LLM Evals & Canaries in your CI/CD Pipeline
🎯
Threat Intelligence
detectionengineering.net
·
4d
How to Detect
Phishing
URLs
using AI in PHP
🛡️
AI Security
cloudmersive.medium.com
·
4d
Malicious
trading website drops malware that hands your browser to
attackers
🌍
Browser Exploits
malware.news
·
4d
Open-source Python engine for
redacting
PII
in images, PDFs, & sheets
🔍
Binary Diffing
hushbee.app
·
5d
·
Hacker News
Faster threat detection with
Boundary
session recording +
Auditbeat
👁️
SIEM Evasion
hashicorp.com
·
4d
Why runtime security matters for
PCI
DSS
compliance
🔒
Runtime Security
webflow.sysdig.com
·
6d
QR
Code Phishing
Evolves
: How to Keep Up
🔎
threat hunting
reversinglabs.com
·
5d
Analysis: Threat Report Review and
SOC
Recommendations
🎯
Threat Intelligence
medium.com
·
5d
aman-sharma-dev/netsentryx
:
NetSentryx
PRO is a real-time, event-driven network monitoring and threat detection system with a SaaS-style live dashboard, flow analytics, and alert engine.
🔍
eBPF
github.com
·
5d
·
r/SideProject
CyberSmart
Partners with Renaissance to Deliver Complete Cyber Confidence for
SMEs
🔐
Hardware Security
itsecurityguru.org
·
4d
Pro-Grade
Java
Development in Claude Code
🔌
LSP
blog.codonomics.com
·
5d
How I Installed
Wazuh
on a VM — A Step-by-Step
Walkthrough
📁
Dotfiles
medium.com
·
4d
Threat Hunting via
InternetMessageId
(+
KQL
Queries)
🎯
Threat Intelligence
malware.news
·
6d
Inside An AWS Cloud Threat Detection
SOC
Lab:
Simulating
and Detecting Real Cloud Attacks
☁️
Cloud Security
malware.news
·
5d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help