Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Threat Modeling
Security Architecture, Risk Assessment, STRIDE, Attack Surface
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
112330
posts in
962.6
ms
A
Conceptual
Framework for Exploration
Hacking
lesswrong.com
·
16h
🔒
Information Security
Must-Know Software
Architecture
Patterns
blog.bytebytego.com
·
16h
🌐
Distributed Systems
Beyond
Permissions
: An
Empirical
Static Analysis of Privacy and Security Risks in Children-Oriented and General-Audience Mobile Apps for Gaming
arxiv.org
·
1d
🔒
Information Security
Beyond the
Whack-A-Mole
: Securing Your AI Agents with DeepMind's
CaMeL
Framework
dev.to
·
11h
·
Discuss:
DEV
🌐
Distributed Systems
GTIG
AI Threat Tracker: Distillation,
Experimentation
, and (Continued) Integration of AI for Adversarial Use
cloud.google.com
·
14h
·
Discuss:
Hacker News
💻
TUI Development
The Missing
Pillar
: Why Cisco's Cybersecurity
Readiness
Index Needs a Human Layer
dev.to
·
2h
·
Discuss:
DEV
🔐
Zero Trust
Authentication Customer Segmentation —
BEACON
: K-Means
Clustering
pub.towardsai.net
·
4h
🚨
Incident Response
The Hidden Risks in Modern
Applications
and How to
Protect
Against Them
theaisurf.com
·
2d
🔒
Information Security
Neural Network
Backdoors
: When Model Poisoning Led to System
Compromise
🧠🔓
infosecwriteups.com
·
1h
🔐
Zero Trust
Cognitive Threat Scanner – Detect manipulation in content using
SCT
taxonomy
github.com
·
1d
·
Discuss:
Hacker News
🔒
Information Security
Worlds
: A Simulation Engine for Agentic
Pentesting
dreadnode.io
·
10h
·
Discuss:
Hacker News
📊
Observability
When Security
Becomes
an
Afterthought
paloaltonetworks.com
·
19h
🔐
Zero Trust
Architecting
Trust: A Framework for Secure IoT Systems Through Trusted Execution and Semantic
Middleware
arxiv.org
·
1d
🔐
Zero Trust
Threat
Escalation
Rarely
Begins With Action.
medium.com
·
16h
🚨
Incident Response
The
Classifier
Layer: Spam, Safety, Intent, Trust Stand Between You And The Answer via @sejournal, @
DuaneForrester
searchenginejournal.com
·
18h
🔐
Zero Trust
CySecurity
News - Latest Information Security and Hacking
Incidents
: Model Context Protocol Security Crisis Deepens as Exposed AI Agents Create Massive Attack Surface
cysecurity.news
·
15h
·
Discuss:
Blogger
🔒
Information Security
This AI Model "Was Ready To Kill
Someone
" When Told It Would Be
Shut
Down
ndtv.com
·
43m
🦀
Rust
How Secret Loyalty
Differs
from Standard
Backdoor
Threats
lesswrong.com
·
14h
🔐
Zero Trust
Securing
GenAI
in the enterprise: Vol. 1 — Challenges and opportunities
pub.towardsai.net
·
4h
🔒
Information Security
Threat Model
Examples
discuss.privacyguides.net
·
5d
🔒
Information Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help