Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ Capability Systems
Operating Systems, Security, Memory Safety, Sandboxing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
185093
posts in
27.8
ms
A
UEFI
System with
SPDM
to Protect Against Unauthorized Device Connections
ย
๐
Hardware Security
arxiv.org
ยท
1d
CHERIoT-Ibex
: Closing the door on memory safety vulnerabilities with
hardware-enforced
protection
ย
๐ก๏ธ
Memory Safety
techcommunity.microsoft.com
ยท
3d
SOC
as a Service Explained:
Benefits
, Features & Security
ย
๐
Security
medium.com
ยท
4h
Linux is getting a security wake-up call - why it was
inevitable
and I'm not
worried
ย
๐ง
Linux
zdnet.com
ยท
1d
How
OCP
S.O.L.I.D.
Completes
The Data Center Security Picture
ย
๐
Hardware Security
semiengineering.com
ยท
5d
Security-hardened
OpenCode
fork
ย
๐ก
SonarQube
lockedcode.ai
ยท
1d
ยท
Hacker News
LeakWatch
2026, Security Incidents, Data
Breaches
, and IT Situation for the Current Calendar Week 19
ย
๐
Hardware Security
igorslab.de
ยท
2d
Security By Design: The
Shortcut
to Smarter,
Safer
Systems
ย
๐
Security
nocomplexity.com
ยท
6d
oss-security - Dirty
Frag
: Universal Linux
LPE
ย
๐
eBPF
openwall.com
ยท
4d
ยท
Lobsters
,
Hacker News
Sandboxing
AIOps
and Agentic AI Security
ย
๐ก๏ธ
AI Security
blog.cosmonic.com
ยท
6d
ยท
Hacker News
Comparing
Sandboxing
Approaches for AI Agents
ย
๐ฆ
Linux cgroups v2
docker.com
ยท
5d
ยท
Hacker News
Proprietary
Software, Hardware and
Protocols
Face AI-Driven Security Risk
ย
๐
Hardware Security
infosecurity-magazine.com
ยท
6d
ยท
Hacker News
The
patching
treadmill
: Why traditional application security is no longer enough
ย
๐
Security
zdnet.com
ยท
1d
AISLE
Discovers
3 Critical Vulnerabilities in FreeBSD
ย
๐
eBPF
aisle.com
ยท
5d
Janus: Compiler-Based Defense Against
Transient
Execution Attacks Using ARM Hardware
Primitives
ย
๐ท๏ธ
Memory Tagging
arxiv.org
ยท
13h
Bringing new levels of security to the cloud-native
frontier
: Unified
posture
management and real-time protection
ย
๐ก๏ธ
AMD SEV
redhat.com
ยท
4d
RAG Security:
Prevent
Data
Leaks
with Access Control
ย
๐ก๏ธ
AI Security
owasp.org
ยท
5d
ยท
DEV
Dirty
Frag
: a zero-day universal Linux
LPE
ย
๐ง
Linux
lwn.net
ยท
4d
ยท
r/netsec
AI is Breaking Two
Vulnerability
Cultures
ย
๐ก๏ธ
AI Security
jefftk.com
ยท
4d
ยท
Lobsters
,
Hacker News
Welcome
to
headless
cloud security
ย
๐
Edge Computing
webflow.sysdig.com
ยท
6d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help