Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74092
posts in
673.6
ms
Visa Says Cybersecurity
Decides
Who Wins Digital
Commerce
pymnts.com
·
1d
🔒
Security
Agentic Banking: How AI Systems and
Tokenized
Compliance Are
Restructuring
Investment and…
medium.com
·
1d
💰
TigerBeetle
S’pore mounts largest cyber-security op against
UNC3886
, more than 100 cyber defenders
activated
straitstimes.com
·
1d
🌐
Network Security
Auditing
Rust
Crates
Effectively
arxiv.org
·
1d
🎲
Quickcheck
Empirical Evaluation of
SMOTE
in Android Malware Detection with Machine Learning: Challenges and Performance in
CICMalDroid
2020
arxiv.org
·
16h
📈
Perfetto
Detecting
Financial Fraud using Anomaly Detection
Techniques
dev.to
·
4d
·
Discuss:
DEV
💰
TigerBeetle
Using Claude Code as a general agent
raahelbaig.com
·
1d
·
Discuss:
Hacker News
🎭
Program Synthesis
Show HN: Applying
OAuth/RBAC
patterns to secure AI agents
macawsecurity.ai
·
1d
·
Discuss:
Hacker News
🛡️
AI Security
How
StrongDM
’s AI team build
serious
software without even looking at the code
jmason.ie
·
1d
💬
Prompt Engineering
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
5d
🛡️
AI Security
gharasathi
(
घर
ासाठी) — A Privacy-First Household AI Running on a $200 Mini PC
amazon.com.au
·
2d
·
Discuss:
DEV
🦙
Ollama
DKnife
toolkit abuses
routers
to spy and deliver malware since 2019
securityaffairs.com
·
2d
🔐
Hardware Security
Show HN:
Klint
– Linux Kernel Security
Scanner
saturnine.cc
·
1d
·
Discuss:
Hacker News
🔍
eBPF
Solarwinds
WHD
flaws exploited in attacks targeting servers and credentials
techradar.com
·
8h
🛡️
AMD SEV
💀 Modern
Malware
’s
Anti-Forensics
dev.to
·
4d
·
Discuss:
DEV
🔍
Digital Forensics
Hackers Deliver Global Group
Ransomware
Offline via
Phishing
Emails
hackread.com
·
23h
🔓
Binary Exploitation
Comprehensive
Data
Analytics
freelancer.pl
·
1d
📊
Data Science
Beyond the
Battlefield
: Threats to the Defense Industrial
Base
cloud.google.com
·
14h
🛡️
Cybersecurity
Algos
,
Bias
, Due Process, & You
suffolklitlab.org
·
1d
·
Discuss:
Hacker News
💬
Prompt Engineering
Import AI 444: LLM
societies
; Huawei makes kernels with AI;
ChipBench
importai.substack.com
·
1d
·
Discuss:
Substack
💬
Prompt Engineering
Loading...
Loading more...
« Page 5
•
Page 7 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help