Skip to main content
Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Threat Modeling
Security Architecture, Risk Assessment, STRIDE, Attack Surface
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80727
posts in
1.13
s
Turning
threat reports into detection
insights
with AI
microsoft.com
·
1h
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Modelleme
ve
Simulasyon
arxiv.org
·
17h
🏗️
Terraform
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
How Digital Threats Escalate into Real-World Risks: The
Metamorphosis
of Data into Social
Weaponry
medium.com
·
3h
🔒
Information Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Foundation-sec-8B-Reasoning
: The First Open-weight Security Reasoning Model
blogs.cisco.com
·
9h
🔒
Information Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Cyware
:
Collective
Threat Analysis and Response
intellyx.com
·
11h
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Zero Trust 2026: Has the Trust Boundary '
Vanished
'? AI, ID-JAG, and
Confidential
Computing
dev.to
·
2h
·
Discuss:
DEV
🔐
Zero Trust
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Probabilistic
modeling of the risk and resilience of
transportation
systems for community resilience analysis
sciencedirect.com
·
9h
🌐
Distributed Systems
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
🔬 Research-Grade Context Engineering This material
represents
high-performance prompt research results designed based on Advanced
Logical
Architectures. 📜 Ma...
freederia.com
·
8h
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
On the
Necessity
of Public Contexts in Hybrid
KEMs
: A Case Study of X-Wing
eprint.iacr.org
·
19h
☸️
Kubernetes
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Benchmarking
LLAMA Model Security Against
OWASP
Top 10 For LLM Applications
arxiv.org
·
17h
🦀
Rust
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Embedding
Security into Business
Processes
cacm.acm.org
·
1d
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Interlock
Ransomware
: New Techniques, Same Old Tricks
fortinet.com
·
8h
🔒
Information Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Software Supply
Chain
Security Report 2025: A
retrospective
reversinglabs.com
·
8h
🚀
CI/CD
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Keyfactor
Research Reveals
Two-Thirds
of Companies Say AI Agents Are a Bigger Security Risk Than Humans
prnewswire.com
·
11h
🔐
Zero Trust
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Haste
Achieves 64% Enhanced LLM Defence Against
Evasive
Attack Techniques
quantumzeitgeist.com
·
7h
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
**
Originality
:** Existing security log analysis and intrusion detection AI primarily focuses on anomaly *detection*, often lacking in fine-grained
attributio
...
freederia.com
·
9h
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
NIST
’s AI guidance pushes cybersecurity
boundaries
csoonline.com
·
15h
🔒
Information Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
The Trends
Defining
Cyber
Security in 2026:
Cyber
Security Report 2026
blog.checkpoint.com
·
1d
🚨
Incident Response
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Building
Trustworthy
Agents: The Business Case for
Rigorous
Evaluation Frameworks
kerno.io
·
1d
·
Discuss:
Hacker News
🌐
Distributed Systems
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Beyond
cracked
screens: how device protection can
evolve
to cover our digital lives
techradar.com
·
7h
🔒
Information Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help