Feeds to Scour
SubscribedAll
Scoured 80727 posts in 1.13 s
Turning threat reports into detection insights with AI
microsoft.com·1h
🚨Incident Response
Preview
Report Post
Modelleme ve Simulasyon
arxiv.org·17h
🏗️Terraform
Preview
Report Post
How Digital Threats Escalate into Real-World Risks: The Metamorphosis of Data into Social Weaponry
medium.com·3h
🔒Information Security
Preview
Report Post
Foundation-sec-8B-Reasoning: The First Open-weight Security Reasoning Model
blogs.cisco.com·9h
🔒Information Security
Preview
Report Post
Cyware: Collective Threat Analysis and Response
intellyx.com·11h
🚨Incident Response
Preview
Report Post
Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing
dev.to·2h·
Discuss: DEV
🔐Zero Trust
Preview
Report Post
Probabilistic modeling of the risk and resilience of transportation systems for community resilience analysis
sciencedirect.com·9h
🌐Distributed Systems
Preview
Report Post
On the Necessity of Public Contexts in Hybrid KEMs: A Case Study of X-Wing
eprint.iacr.org·19h
☸️Kubernetes
Preview
Report Post
Benchmarking LLAMA Model Security Against OWASP Top 10 For LLM Applications
arxiv.org·17h
🦀Rust
Preview
Report Post
Embedding Security into Business Processes
cacm.acm.org·1d
🚨Incident Response
Preview
Report Post
Interlock Ransomware: New Techniques, Same Old Tricks
fortinet.com·8h
🔒Information Security
Preview
Report Post
Software Supply Chain Security Report 2025: A retrospective
reversinglabs.com·8h
🚀CI/CD
Preview
Report Post
Keyfactor Research Reveals Two-Thirds of Companies Say AI Agents Are a Bigger Security Risk Than Humans
prnewswire.com·11h
🔐Zero Trust
Preview
Report Post
Haste Achieves 64% Enhanced LLM Defence Against Evasive Attack Techniques
quantumzeitgeist.com·7h
🚨Incident Response
Preview
Report Post
**Originality:** Existing security log analysis and intrusion detection AI primarily focuses on anomaly *detection*, often lacking in fine-grained attributio...
freederia.com·9h
🚨Incident Response
Preview
Report Post
NIST’s AI guidance pushes cybersecurity boundaries
csoonline.com·15h
🔒Information Security
Preview
Report Post
The Trends Defining Cyber Security in 2026: Cyber Security Report 2026
blog.checkpoint.com·1d
🚨Incident Response
Preview
Report Post
Building Trustworthy Agents: The Business Case for Rigorous Evaluation Frameworks
kerno.io·1d·
Discuss: Hacker News
🌐Distributed Systems
Preview
Report Post
Beyond cracked screens: how device protection can evolve to cover our digital lives
techradar.com
·7h
🔒Information Security
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help