Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Cybersecurity
Memory Safety, Vulnerability Research, Secure Coding, Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123930
posts in
1.75
s
University of Arkansas at Little Rock unveils new
Cyberspace
Operations
Research and Education center
fox16.com
·
17h
🏗️
Systems Design
Intel and Google
Strengthen
Intel Trust Domain
Extensions
in Joint Security Review
techpowerup.com
·
1d
📱
Edge AI
'
Cybersecurity
incidents
could surge 20 pc this year'
rediff.com
·
6h
🏗️
Systems Design
BellSoft
Survey Finds Container Security Practices Are
Undermining
Developers’ Own Goals
infoq.com
·
1d
🔧
Embedded Rust
Critical Thinking
Collapse
2.0: AI’s Impact on
OSINT
dutchosintguy.com
·
5h
🧠
AI
State of
JavaScript
2025
i-programmer.info
·
6h
⚡
Zig
Can you trust
LastPass
in 2026? Inside the
multimillion-dollar
quest to rebuild its security culture
zdnet.com
·
3h
·
Discuss:
Hacker News
⛓️
Blockchain
AV-Comparatives
Publishes
Security Survey 2026: Global Trends in Cybersecurity Adoption and Threat Perception
prnewswire.com
·
2d
🔌
Embedded Systems
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
1d
🔧
Embedded Rust
Evaluating and Enhancing the
Vulnerability
Reasoning
Capabilities
of Large Language Models
arxiv.org
·
2d
🔄
MLOps
CISOs
must
separate
signal from noise as CVE volume soars
csoonline.com
·
12h
⚡
Zig
U.S.
CISA
adds Microsoft Office and Microsoft Windows flaws to its Known
Exploited
Vulnerabilities catalog
securityaffairs.com
·
11h
⚡
Zig
Infrastructure as Code in
Practice
: What It
Solves
— and What It Doesn’t
hackernoon.com
·
1d
🏗️
Systems Design
Solarwinds
WHD
flaws exploited in attacks targeting servers and credentials
techradar.com
·
1d
⚡
Zig
Differential-Linear Attacks from New
Distinguishers
: the case of
SERPENT
and PRESENT
eprint.iacr.org
·
2d
🔧
Embedded Rust
New research: 3 big challenges
facing
security teams (and how to
overcome
them)
cybersecuritydive.com
·
2d
🧠
AI
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🕸️
WebAssembly
security center at university of Washington
secure-center.org
·
3d
👁️
Computer Vision
Can
Hardware
Save Us from Software?
lesswrong.com
·
2d
🔌
Embedded Systems
We hid
backdoors
in
binaries
– Opus 4.6 found 49% of them
quesma.com
·
1d
·
Discuss:
Hacker News
,
Hacker News
,
r/ClaudeAI
,
r/programming
🔧
Embedded Rust
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help