Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
104677
posts in
3.67
s
A week in security (February 2
malwarebytes.com
·
2d
🔒
Security
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
5d
🛡️
AI Security
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
5d
🔍
eBPF
The European
Commission
's mobile device platform was
hacked
metacurity.com
·
1d
🔍
Digital Forensics
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
5d
🔓
Binary Exploitation
Enhancing
Arabic
healthcare fake news detection with data
augmentation
and multi-metric analysis using large language models
nature.com
·
1d
💬
Natural Language Processing
Hackers Use Signal
QR
Codes to
Spy
on Military and Political Leaders
hackread.com
·
1d
🔐
Hardware Security
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
2d
·
Discuss:
DEV
📡
SonarQube
A Coding Implementation to Establish Rigorous Prompt
Versioning
and Regression Testing Workflows for Large Language Models using
MLflow
marktechpost.com
·
2d
🚀
MLOps
Bloody Wolf Targets Uzbekistan, Russia Using
NetSupport
RAT in
Spear-Phishing
Campaign
thehackernews.com
·
1d
🛡️
Packet Filtering
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
3d
·
Discuss:
DEV
🦙
Ollama
Datadog
QA
datadoghq.dev
·
2d
🧪
Testing
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
3d
🛡️
AI Security
15 Top Open-Source Intelligence Tools
medium.com
·
2d
🌐
Network Security
Auditing
Rust
Crates
Effectively
arxiv.org
·
2d
🎲
Quickcheck
Algos
,
Bias
, Due Process, & You
suffolklitlab.org
·
1d
·
Discuss:
Hacker News
💬
Prompt Engineering
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
2d
·
Discuss:
Substack
🔍
eBPF
Algorithmic
Governance in the United States: A Multi-Level Case Analysis of AI Deployment Across Federal, State, and
Municipal
Authorities
arxiv.org
·
1d
⚓
Anchors
The Indicator Guide to hunting for documents and files in open
buckets
, servers, and
directories
indicator.media
·
2d
🔍
Tantivy
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
2d
·
Discuss:
Hacker News
🌐
IPFS
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help