Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Cybersecurity
Memory Safety, Vulnerability Research, Secure Coding, Cryptography
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
123466
posts in
1.35
s
CISOs
must
separate
signal from noise as CVE volume soars
csoonline.com
Β·
18h
β‘
Zig
CrowdStrike
Researchers Identify Hidden Vulnerabilities in
AI-Coded
Software
crowdstrike.com
Β·
1d
Β·
Discuss:
r/Infosec
π±
Edge AI
A week in security (February 2
malwarebytes.com
Β·
2d
π€
Robotics
Tech companies need to
unite
and make device security
easier
for users, say experts
techxplore.com
Β·
1d
βοΈ
Blockchain
The hunt for
truly
zero-CVE
container images
thenewstack.io
Β·
1d
Β·
Discuss:
Hacker News
β‘
Zig
From Quantum Threat to AI Exposure: Why Security Is
Converging
Faster Than
Enterprises
Expect
thequantuminsider.com
Β·
2d
βοΈ
Blockchain
Links 11/02/2026:
Fentanylware
(
CheeTok
) for ICE, Jimmy Lai Shows Journalism Became 'Crime' in Hong Kong
techrights.org
Β·
7h
π§
Embedded Rust
Improving
your response to
vulnerability
management
ncsc.gov.uk
Β·
2d
π
MLOps
Can
Hardware
Save Us from Software?
lesswrong.com
Β·
2d
π
Embedded Systems
ISC
Stormcast
For Wednesday, February 11th, 2026 https://
isc.sans.edu/podcastdetail/9804
, (Wed, Feb 11th)
isc.sans.edu
Β·
23h
π§
Embedded Rust
JUXT
Blog: From
specification
to stress test: a weekend with Claude
juxt.pro
Β·
1d
β‘
Zig
A
dataset
collected
in real-world industrial control systems for network attack detection
nature.com
Β·
2d
π§
Embedded Rust
New comment by
Fiveplus
in "Windows
Notepad
App Remote Code Execution Vulnerability"
news.ycombinator.com
Β·
17h
Β·
Discuss:
Hacker News
β‘
Zig
MacrOData
: New Benchmarks of Thousands of Datasets for Tabular
Outlier
Detection
arxiv.org
Β·
20h
π
MLOps
AI giants are
racing
to secure
shrinking
memory. Itβs creating opportunities for startups
sifted.eu
Β·
2d
β‘
Zig
The
GNU
C
Compiler
Breaks Security
i-programmer.info
Β·
7h
β‘
Zig
LLMs
Refuse
High-Cost Attacks but Stay
Vulnerable
to Cheap, Real-World Harm
expectedharm.github.io
Β·
1d
Β·
Discuss:
Hacker News
π
MLOps
Agents Can
Either
Be
Useful
or Secure
auth0.com
Β·
1d
π±
Edge AI
FOSDEM
26
dev.to
Β·
3h
Β·
Discuss:
DEV
β
Systems Programming
When is a
bug
not a
bug
?
blog.zarfhome.com
Β·
22h
β‘
Zig
Loading...
Loading more...
« Page 6
β’
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help