Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74020
posts in
1.14
s
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
3d
🦅
Falco
How
Wix
Built AI-Driven Incident Response at Scale with ClickHouse and Wild
Moose
clickhouse.com
·
6h
⏱️
Temporal Workflow
Digital
Footprint
—
TryHackMe
Room Write-up
medium.com
·
6h
👆
Fingerprinting
State-sponsored actor engaged in
reconnaissance
activity targeting government
entities
connecting to 155 countries in global-scale operations dubbed 'Shadow Cam...
bleepingcomputer.com
·
2d
·
Discuss:
r/technews
🔍
eBPF
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
·
4h
·
Discuss:
DEV
🔍
eBPF Verifier
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
1d
🔍
Digital Forensics
ELA-1640-1
python2.7
security update
freexian.com
·
11h
🦅
Falco
Measuring
AI Security: What MCP
Exposure
Really Shows
rapid7.com
·
1h
🛡️
AI Security
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
21h
·
Discuss:
Hacker News
🔐
Capability Systems
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 83
securityaffairs.com
·
2d
🌐
Network Security
AI-augmented
data quality engineering
infoworld.com
·
1d
📱
Edge AI
Building a Lightweight, Secure Infra Cluster Monitor with
InfluxDB
and
Grafana
pixelstech.net
·
1d
📈
Prometheus
Risky Bulletin:
SmarterTools
hacked
via its own product
news.risky.biz
·
1d
🔐
Hardware Security
Sleeper Shells: How Attackers Are Planting Dormant Backdoors in
Ivanti
EPMM
defusedcyber.com
·
1d
·
Discuss:
Hacker News
🔓
Binary Exploitation
👻 **
Living
Off The Land
Evasion
**
dev.to
·
1d
·
Discuss:
DEV
🔓
Binary Exploitation
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
4d
🔐
Hardware Security
New
OpenClaw
AI agent found
unsafe
for use
kaspersky.com
·
4h
🛡️
AI Security
CrowdSec
Cyber
Threat Intelligence
app.crowdsec.net
·
23h
🔎
Quickwit
Financial
OSINT
: Guide to
tracing
corporate assets & networks
spotlight.ebu.ch
·
2d
🔍
Digital Forensics
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
1d
🔓
Binary Exploitation
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help