Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Cybersecurity
Memory Safety, Vulnerability Research, Secure Coding, Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123719
posts in
521.5
ms
Software developers: Prime cyber targets and a rising risk
vector
for
CISOs
csoonline.com
·
2d
🔄
MLOps
This new '
sleeperware
' doesn't set off alarms or crash your system - it
sneaks
in and waits
zdnet.com
·
23h
🔧
Embedded Rust
$\
mathsf
{SoK}$: On
Cryptography
for Multi-Cloud Storage
eprint.iacr.org
·
2d
⚙
Systems Programming
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
1d
·
Discuss:
Hacker News
🏗️
Systems Design
Risky Bulletin: Chinese cyber-spies
breached
all of Singapore's
telcos
news.risky.biz
·
14h
⚡
Zig
AI
Disruption
ma.tt
·
16h
📱
Edge AI
The Register: Microsoft
boffins
figured
out how to break LLM safety guardrails with one simple prompt
rbfirehose.com
·
6h
⚙
Systems Programming
Securing
the Digital
Nerve
System: A Practical Guide to Implementing Zero Trust API Security
hackernoon.com
·
1d
⛓️
Blockchain
HTB
:
Breach
0xdf.gitlab.io
·
1d
🔧
Embedded Rust
On Windows Patch day, Google
helped
Intel improve a major security feature on its
CPUs
neowin.net
·
23h
⚡
Zig
Keeper Security Achieves
GovRAMP
High Authorization, Enabling
SLED
Organizations to Secure Their Most Sensitive Systems and Data
prnewswire.com
·
1h
⛓️
Blockchain
How ‘effectively zero-knowledge’
proofs
could transform
cryptography
scientificamerican.com
·
5h
⛓️
Blockchain
Solarwinds
WHD
flaws exploited in attacks targeting servers and credentials
techradar.com
·
1d
⚡
Zig
Security fix
wallabag.org
·
3h
🦀
Rust
SecureFlow
: Automating Cryptographic and Data Flow Security for Modern
Backends
github.com
·
16m
·
Discuss:
DEV
⚡
Zig
Hope Is Not a Security Strategy: Why
Secure-by-Default
Beats
Hardening
programming.dev
·
12h
🔧
Embedded Rust
WSL
in the Malware Ecosystem, (
Wed
, Feb 11th)
isc.sans.edu
·
4h
🔌
Embedded Systems
AI Code’s Logic Can Now Be
Checked
From Within,
Bypassing
External Tests
quantumzeitgeist.com
·
3h
🔄
MLOps
Exposed
Training Open the Door for Crypto-Mining in
Fortune
500 Cloud Environments
thehackernews.com
·
6h
🔄
MLOps
Evaluating and Enhancing the
Vulnerability
Reasoning
Capabilities
of Large Language Models
arxiv.org
·
2d
🔄
MLOps
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help