Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
72835
posts in
688.6
ms
OpenClaw
Skill
Marketplace
Emerges as Active Malware Vector ...
socket.dev
·
12h
🔀
Crossbeam
ELA-1640-1
python2.7
security update
freexian.com
·
3h
🦅
Falco
I used a single open-source tool to
clean
my Mac, Windows, and Linux
drives
makeuseof.com
·
12h
📵
Digital Minimalism
Sleeper Shells: How Attackers Are Planting Dormant Backdoors in
Ivanti
EPMM
defusedcyber.com
·
19h
·
Discuss:
Hacker News
🔓
Binary Exploitation
AI Helps Scam Centers
Evade
Crackdown in Asia,
Dupe
More Victims
bloomberg.com
·
13h
·
Discuss:
Hacker News
🛡️
AI Security
State-sponsored actor engaged in
reconnaissance
activity targeting government
entities
connecting to 155 countries in global-scale operations dubbed 'Shadow Cam...
bleepingcomputer.com
·
1d
·
Discuss:
r/technews
🔍
eBPF
CrowdSec
Cyber
Threat Intelligence
app.crowdsec.net
·
15h
🔎
Quickwit
Uncovering
Hidden
Informations
whiteravendev.itch.io
·
1d
🔍
Reverse Engineering
Building a Lightweight, Secure Infra Cluster Monitor with
InfluxDB
and
Grafana
pixelstech.net
·
1d
📈
Prometheus
European Commission
probes
intrusion
into staff mobile management backend
theregister.com
·
23h
🔍
Digital Forensics
Automatic monitoring of brand
counterfeits
and protection for the factory -
Lumene
Group upgraded its cyber solutions to a new era
prnewswire.com
·
1d
🔐
Hardware Security
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
22h
🔍
Digital Forensics
Identity Access Management:
pillar
of security and
compliance
clever.cloud
·
20h
🔑
Kanidm
Inside
GhostPoster
: How a PNG Icon
Infected
50,000 Firefox Users
koi.ai
·
2h
🧩
Browser Extensions
Unlocking
the hidden power of
unstructured
data with AI
theregister.com
·
1d
🎭
Program Synthesis
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 83
securityaffairs.com
·
1d
🌐
Network Security
ValentinoPalomba/FRTMProxy
: Open source alternative to Proxyman and Charles
github.com
·
23h
·
Discuss:
Hacker News
🔍
eBPF
6 tiny programs I use to
solve
annoying
problems
xda-developers.com
·
18h
💻
Terminal Tools
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
4d
🔐
Hardware Security
LLMs
Refuse
High-Cost Attacks but Stay
Vulnerable
to Cheap, Real-World Harm
expectedharm.github.io
·
5h
·
Discuss:
Hacker News
🔒
BPF LSM
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help