Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Threat Modeling
Security Architecture, Risk Assessment, STRIDE, Attack Surface
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80082
posts in
861.7
ms
Securing
GenAI
: Vol 5 — Model deployment and change management
pub.towardsai.net
·
1h
🔐
Zero Trust
What
Anthropic
’s Latest Model Reveals About the Future of
Cybersecurity
tenable.com
·
6h
🚨
Incident Response
Beyond Function-Level Analysis: Context-Aware Reasoning for
Inter-Procedural
Vulnerability
Detection
arxiv.org
·
1d
🦀
Rust
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
12h
·
Discuss:
Hacker News
🔒
Information Security
SHIELD.md
: A Security Standard for
OpenClaw
and AI Agents
blog.securitybreak.io
·
1d
🔐
Zero Trust
Practical Strategies for
Securing
Web
APIs
in Modern Applications
dev.to
·
17h
·
Discuss:
DEV
🔑
OAuth
Perceptions of Threat,
Correlates
of
Dread
, and Collective Instability
inss.ndu.edu
·
13h
🔒
Information Security
Data Modeling for the Agentic Era:
Semantics
, Speed, and
Stewardship
rilldata.com
·
12h
·
Discuss:
Hacker News
📊
Observability
Show HN:
Multi-attribute
decision
frameworks
for tech purchases
news.ycombinator.com
·
18m
·
Discuss:
Hacker News
🌐
Distributed Systems
Why
securing
AI model
weights
isn’t enough
the-substrate.net
·
8h
·
Discuss:
Hacker News
🔐
Zero Trust
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
1d
🔐
Zero Trust
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
·
11h
🚨
Incident Response
The Myth of “Known APIs”: Why
Inventory-First
Security Models Are Already
Obsolete
lab.wallarm.com
·
16h
📊
Observability
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
7h
·
Discuss:
Hacker News
🚨
Incident Response
AI Code Generation Tools Repeat Security Flaws, Creating
Predictable
Software
Weaknesses
quantumzeitgeist.com
·
16h
🦀
Rust
Claude
Opus
4.6: System Card Part 1:
Mundane
Alignment and Model Welfare
lesswrong.com
·
7h
🔒
Information Security
A
Practitioner
’s Guide to
Taxonomies
, Part III
jessicatalisman.substack.com
·
32m
·
Discuss:
Substack
☸️
Kubernetes
AV-Comparatives
Publishes
Security Survey 2026: Global Trends in Cybersecurity Adoption and Threat Perception
prnewswire.com
·
18h
🔒
Information Security
Malicious
Agent Skills in the Wild: A Large-Scale Security
Empirical
Study
arxiv.org
·
1d
🔒
Information Security
UNC1069
Targets Cryptocurrency Sector with New
Tooling
and AI-Enabled Social Engineering
cloud.google.com
·
15h
🔒
Information Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help