Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
馃毃 Incident Response
Security Operations, Threat Detection, Forensics, SOC
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80227
posts in
326.8
ms
What Is Cyber
Incident
Response and Why It
Matters
securityscorecard.com
路
6d
馃敀
Information Security
Improving
your response to
vulnerability
management
ncsc.gov.uk
路
12h
馃幆
Threat Modeling
NEWS
ROUNDUP
digitalforensicsmagazine.com
路
20h
馃敀
Information Security
How Top
CISOs
Solve Burnout and Speed up
MTTR
without Extra Hiring
thehackernews.com
路
21h
馃殌
CI/CD
Cisco
Redefines
Security for the Agentic Era with AI Defense Expansion and AI-Aware
SASE
prnewswire.com
路
2m
馃幆
Threat Modeling
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
路
10h
路
Discuss:
Hacker News
馃搳
Observability
Disaster
Readiness
Starts Before the Storm [Call for Experts]
metro-magazine.com
路
11h
馃
Rust
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
路
14h
馃敀
Information Security
Beyond Function-Level Analysis: Context-Aware Reasoning for
Inter-Procedural
Vulnerability
Detection
arxiv.org
路
1d
馃幆
Threat Modeling
S鈥檖ore mounts largest cyber-security op against
UNC3886
, more than 100 cyber defenders
activated
straitstimes.com
路
1d
馃敀
Information Security
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
路
12h
馃
Rust
European Commission
Investigating
Cyberattack
securityweek.com
路
1d
馃敀
Information Security
What Is
Exploratory
Data Analysis (
EDA
)?
slubowisko.pl
路
1d
馃敀
Information Security
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
路
3d
馃幆
Threat Modeling
Choosing
the Right Strategy: Cold Boot
Forensics
vs Live System Analysis
blog.elcomsoft.com
路
20h
馃敀
Information Security
Why I Spent 5 Hours Finding a 20-Minute Fix: A Case for
Structured
Logging
nandishdave.world
路
52m
路
Discuss:
DEV
馃殌
CI/CD
OSINT
Exercise
#006
medium.com
路
6h
馃敀
Information Security
From Security Operations to Security Leadership:
Sophos
CISO
Advantage
sophos.com
路
1d
馃敀
Information Security
Romania鈥檚 national oil pipeline firm
Conpet
reports
cyberattack
securityaffairs.com
路
23h
馃敀
Information Security
Criminal IP Integrates with IBM
QRadar
to Deliver Real-Time Threat Intelligence Across
SIEM
and SOAR
nextbigfuture.com
路
18h
馃幆
Threat Modeling
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help