Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Cybersecurity
Memory Safety, Vulnerability Research, Secure Coding, Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
121720
posts in
1.77
s
Looking for
input
on storage of some things
harborfreight.com
·
2d
·
Discuss:
r/computers
🗃️
SQLite
Cybersecurity
Simulation
Games
trendhunter.com
·
2d
🔧
Embedded Rust
ELA-1640-1
python2.7
security update
freexian.com
·
2d
🕸️
WebAssembly
Enterprise
Collaboration
Solutions |
Docs
, Storage & AI
thinkfree.com
·
2d
🗄️
Databases
Domain
Specific
Languages
martinfowler.com
·
1d
⚙️
LLVM
IT Security Weekend
Catch
Up
badcyber.com
·
4d
🔌
Embedded Systems
Vigil
Network: Information Architecture and Communication
Standards
stationeering.substack.com
·
1d
·
Discuss:
Substack
🔌
Embedded Systems
a search engine and live map for internet
scanners
and
botnets
whatoblock.com
·
3d
·
Discuss:
Hacker News
👁️
Observability
Open Source in Focus: .NET Projects and the Tools Behind Them
blog.jetbrains.com
·
2d
🕸️
WebAssembly
Why I Spent 5 Hours Finding a 20-Minute Fix: A Case for
Structured
Logging
nandishdave.world
·
2d
·
Discuss:
DEV
🏗️
Systems Design
Sleeper Shells: How Attackers Are Planting Dormant Backdoors in
Ivanti
EPMM
defusedcyber.com
·
2d
·
Discuss:
Hacker News
🔧
Embedded Rust
Most quantum computer scientists are
complicit
hackers
shashvatshukla.com
·
2d
⛓️
Blockchain
Securing
GenAI
: Vol 5 — Model deployment and change management
pub.towardsai.net
·
2d
🔄
MLOps
Rise of the
Cowboy
Coder
jollycoder.com
·
2d
·
Discuss:
Hacker News
⚙
Systems Programming
Awesome
OSINT
For “Everything” Part 1
osintteam.blog
·
1d
👁️
Computer Vision
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
2d
🔌
Embedded Systems
A single-cell
transcriptomic
dataset profiling traumatic brain injury and
NeuroD1-based
gene therapy in mice
nature.com
·
2d
👁️
Computer Vision
February 2026 Patch Tuesday: Six new and
actively
exploited Microsoft vulnerabilities
addressed
csoonline.com
·
1d
⚡
Zig
Information Flow Verification Framework
Integrating
Static and
Formal
Verification Methods At The Pre-Silicon Stage (U. of Florida)
semiengineering.com
·
1d
🔧
Embedded Rust
How the GNU C Compiler became the
Clippy
of
cryptography
theregister.com
·
2d
·
Discuss:
Hacker News
,
r/programming
⚡
Zig
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help