Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🚨 Incident Response
Security Operations, Threat Detection, Forensics, SOC
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81724
posts in
819.6
ms
What Is Cyber
Incident
Response and Why It
Matters
securityscorecard.com
·
6d
🔒
Information Security
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
16h
🔒
Information Security
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
6h
·
Discuss:
Hacker News
📊
Observability
How Top
CISOs
Solve Burnout and Speed up
MTTR
without Extra Hiring
thehackernews.com
·
16h
🚀
CI/CD
Disaster
Readiness
Starts Before the Storm [Call for Experts]
metro-magazine.com
·
7h
🦀
Rust
Beyond Function-Level Analysis: Context-Aware Reasoning for
Inter-Procedural
Vulnerability
Detection
arxiv.org
·
22h
🎯
Threat Modeling
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
·
10h
🔒
Information Security
S’pore mounts largest cyber-security op against
UNC3886
, more than 100 cyber defenders
activated
straitstimes.com
·
22h
🔒
Information Security
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
7h
🦀
Rust
European Commission
Investigating
Cyberattack
securityweek.com
·
19h
🔒
Information Security
Criminal IP Integrates with IBM
QRadar
to Deliver Real-Time Threat Intelligence Across
SIEM
and SOAR
nextbigfuture.com
·
13h
🎯
Threat Modeling
What Is
Exploratory
Data Analysis (
EDA
)?
slubowisko.pl
·
20h
🔒
Information Security
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
3d
🎯
Threat Modeling
Choosing
the Right Strategy: Cold Boot
Forensics
vs Live System Analysis
blog.elcomsoft.com
·
16h
🔒
Information Security
OSINT
Exercise
#006
medium.com
·
1h
🔒
Information Security
Romania’s national oil pipeline firm
Conpet
reports
cyberattack
securityaffairs.com
·
18h
🔒
Information Security
Bodycam
video,
incident
reports from Brown University shooting response released
ketv.com
·
12h
🔒
Information Security
Building a Lightweight, Secure Infra Cluster Monitor with
InfluxDB
and
Grafana
pixelstech.net
·
23h
📊
Observability
A
practical
systems engineering guide:
Architecting
AI-ready infrastructure for the agentic era
thenewstack.io
·
5h
🏗️
Terraform
CrowdSec
Cyber
Threat Intelligence
app.crowdsec.net
·
8h
🔒
Information Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help