Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Capability Systems
Operating Systems, Security, Memory Safety, Sandboxing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
146416
posts in
39.6
ms
Security-focused
platform with
hardened
architecture
securos.org
·
18h
·
Discuss:
Hacker News
🛡️
AMD SEV
Securing RISC-V Third-Party IP: Enabling Comprehensive
CWE-Based
Assurance
Across the Design Supply Chain
semiwiki.com
·
9h
🔐
Hardware Security
Updating
your security
mindset
: Keep your data private and your devices secure
mashable.com
·
5h
🔒
Security
Valuable
News
vermaden.wordpress.com
·
9h
🐧
Linux
Securing Linux with
SELinux
(or
AppArmor
)
linuxblog.io
·
15h
🐧
Linux
5 Systems-Level Attack Surfaces That Are
Architectural
Consequences of Edge-Local Deployment (
Imperial
College London)
semiengineering.com
·
3h
🔗
Intrusive Containers
Distroless
Images Security
dev.to
·
19h
·
Discuss:
DEV
🛡️
AMD SEV
Industrial-Grade
Physical
AI Systems
trendhunter.com
·
11h
🛡️
AI Security
MCP Security in 2026: Lessons From Real
Exploits
and Early
Breaches
hackernoon.com
·
6h
📦
Folly
The
Swiss
Army
knife
PC
fanlesstech.com
·
1h
·
Discuss:
Blogger
🔐
Hardware Security
Make
HIPAA
Compliance Easier & More
Accurate
with Automation
spin.atomicobject.com
·
14h
📝
Write-Ahead Logging
AI Models on
Realistic
Cyber
Ranges
red.anthropic.com
red.anthropic.com
·
1d
🛡️
AI Security
Distrobox
lets me run Ubuntu apps on Fedora and Arch apps on Debian, all without
touching
my base system
xda-developers.com
·
7h
🐧
Linux
I finally
learned
what
TOPS
mean — and why your next PC needs 45
makeuseof.com
·
7h
🌊
Memory Bandwidth
APT37
combines cloud storage and USB implants to
infiltrate
air-gapped systems
securityaffairs.com
·
14h
🛡️
AMD SEV
Windows 12: AI
compulsion
, 40 TOPS, and the
calculated
PC restart
igorslab.de
·
22h
💻
Operating Systems
How Threat Intelligence and Multi-Source Data Drive Smarter
Vulnerability
Prioritization
blog.checkpoint.com
·
15h
💓
PHI Accrual
Secure Boot — Fedora, RHEL, and
shim
upstream maintenance: government involvement or lack
thereof
blog.uncooperative.org
·
12h
🐧
Linux
Breaking Out of
Citrix
and other
Restricted
Desktop Environments
pentestpartners.com
·
9h
🔓
Binary Exploitation
Building a Virtual Computer for the Intel 80286
hackster.io
·
7h
⚡
RISC-V
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help