Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73223
posts in
1.17
s
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
·
3d
·
Discuss:
Blogger
🔒
Security
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
2d
🔒
Security
How I Approach a System I Have Never Seen Before
dev.to
·
1d
·
Discuss:
DEV
📝
Write-Ahead Logging
Someone's attacking
SolarWinds
WHD
to steal high‑privilege credentials - but we don't know who or how
theregister.com
·
19h
·
Discuss:
Hacker News
🛡️
AMD SEV
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
2d
·
Discuss:
DEV
📡
SonarQube
When Evaluation Becomes a Side Channel: Regime
Leakage
and Structural
Mitigations
for Alignment Assessment
arxiv.org
·
12h
💫
Effect Systems
Home
tampermonkey.net
·
1d
🧩
Browser Extensions
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
1d
·
Discuss:
Substack
🔍
eBPF
Dependable
Artificial Intelligence with Reliability and Security (
DAIReS
): A Unified Syndrome Decoding Approach for Hallucination and Backdoor Trigger Detection
arxiv.org
·
1d
🛡️
AI Security
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
2d
💾
Retro Computing
Going Through
Snowden
Documents
, Part 1
libroot.org
·
2d
·
Discuss:
Lobsters
🔍
Digital Forensics
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
1d
·
Discuss:
Hacker News
💬
Prompt Engineering
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
·
2d
·
Discuss:
Substack
🧩
Browser Extensions
Unlocking
the hidden power of
unstructured
data with AI
theregister.com
·
1d
🎭
Program Synthesis
Power
Automate
powerdevbox.com
·
1d
·
Discuss:
DEV
🐚
Shell Scripting
How Top
CISOs
Solve Burnout and Speed up
MTTR
without Extra Hiring
thehackernews.com
·
1d
💓
PHI Accrual
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
·
23h
🔒
Security
Fundamentals
of Data
Visualization
clauswilke.com
·
2d
📊
Data Visualization
AI
backdoor
threats: Detecting ‘
sleeper
agents’ in large language models
scworld.com
·
3d
🛡️
AI Security
Software Engineering with AI: Beyond
Vibe-Coding
principalengineer.com
·
2d
🎭
Program Synthesis
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help