Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
146394
posts in
28.2
ms
digital
forensics
—
torrent
file analysis for windows!
medium.com
·
47m
🔍
Digital Forensics
Malware
Analysis and Reverse Engineering Report: A Hands-On Journey Through
Macro
Malware
…
medium.com
·
11h
🔍
Reverse Engineering
Solved: The security
researcher
’s guide to
mathematics
dev.to
·
11h
·
Discuss:
DEV
🔒
Security
Malware
Analysis: How to
Analyze
and Understand
Malware
blackhillsinfosec.com
·
5d
🔍
Digital Forensics
Jamf
Mobile
Forensics
: Advanced Mobile Security Updates
jamf.com
·
14h
🔍
Digital Forensics
Twenty
Minutes,
Seventeen
Organizations: Inside the Race to Detect AI-Driven Attacks
smarterarticles.co.uk
·
1d
🛡️
AI Security
Static
taint
analysis for LLM agents
deepclause.substack.com
·
23h
·
Discuss:
Substack
🦙
Ollama
Recommend way to
scan
the database for malware or
malicious
code
reddit.com
·
11h
·
Discuss:
r/Wordpress
🗄️
SQLx
⚡ Weekly Recap:
SD-WAN
0-Day, Critical
CVEs
, Telegram Probe, Smart TV Proxy SDK and More
thehackernews.com
·
13h
🔐
Hardware Security
Lomas
: An Open-Source Platform for Confidential Analysis of Data (
dgwk2026
)
cdn.media.ccc.de
·
21h
🔒
Digital Privacy
Updating
your security
mindset
: Keep your data private and your devices secure
mashable.com
·
5h
🔒
Security
Message
Analysis Tools
trendhunter.com
·
1d
📝
NLP
Inside a
hacker
’s target list – Which
sectors
are most at risk
iotinsider.com
·
11h
🔒
Security
Behavioral
analysis vs.
device
intelligence: Which is better?
fingerprint.com
·
4d
📈
Prometheus
Criminal IP to
Present
Decision-Ready Threat Intelligence at
RSAC
™ 2026
hackread.com
·
13h
🌐
Network Security
aerosta/rewardhackwatch
: Runtime detector for reward hacking and misalignment in LLM agents (89.7% F1 on 5,391 trajectories).
github.com
·
1d
·
Discuss:
Hacker News
,
r/SideProject
💓
PHI Accrual
2nd March – Threat Intelligence Report
research.checkpoint.com
·
10h
🔒
Security
Day 17 – Building
SaaS-Grade
Analytics for My AI
Phishing
Defense Platform
dev.to
·
5h
·
Discuss:
DEV
💓
PHI Accrual
Exploring Robust Intrusion Detection: A Benchmark Study of Feature
Transferability
in IoT
Botnet
Attack Detection
arxiv.org
·
22h
🔍
eBPF
Hackers
hijack
.arpa
domain for phishing scams — hosting malicious websites and domains where no one can spot them
techradar.com
·
3h
🛡️
Packet Filtering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help