Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74054
posts in
761.3
ms
Ars
Technica
: The rise of
Moltbook
suggests viral AI prompts may be the next big security threat
rbfirehose.com
·
2d
🛡️
AI Security
**Abstract:** This research proposes a novel framework for adaptive hybrid threat
attribution
, leveraging multi-modal
anomaly
detection and temporal graph an...
freederia.com
·
4d
📈
Prometheus
When
Benign
Inputs Lead to Severe Harms:
Eliciting
Unsafe Unintended Behaviors of Computer-Use Agents
arxiv.org
·
15h
🛡️
AI Security
Semantics
and Multi-Query Optimization Algorithms for the
Analyze
Operator
arxiv.org
·
15h
🗺️
Query Planning
security center at university of Washington
secure-center.org
·
2d
🌐
Network Security
Import AI 444: LLM
societies
; Huawei makes kernels with AI;
ChipBench
importai.substack.com
·
1d
·
Discuss:
Substack
💬
Prompt Engineering
OSINT
Exercise
#006
medium.com
·
18h
🛡️
Cybersecurity
European Commission
probes
intrusion
into staff mobile management backend
theregister.com
·
1d
🔍
Digital Forensics
Agents That Build Agents — Building
Autonomous
Browsing
with Claude Code
dev.to
·
11h
·
Discuss:
DEV
🎭
Program Synthesis
Someone's attacking
SolarWinds
WHD
to steal high‑privilege credentials - but we don't know who or how
theregister.com
·
22h
·
Discuss:
Hacker News
🛡️
AMD SEV
How I Approach a System I Have Never Seen Before
dev.to
·
1d
·
Discuss:
DEV
📝
Write-Ahead Logging
SolarWinds
Web Help Desk Exploited for
RCE
in Multi-Stage Attacks on Exposed Servers
thehackernews.com
·
1d
🔍
eBPF
Automatic monitoring of brand
counterfeits
and protection for the factory -
Lumene
Group upgraded its cyber solutions to a new era
prnewswire.com
·
1d
🔐
Hardware Security
CySecurity
News - Latest Information Security and Hacking Incidents: Dozens of Government and Infrastructure Networks
Breached
in Global Espionage Campaign
cysecurity.news
·
3d
·
Discuss:
Blogger
🛡️
Cybersecurity
Home
tampermonkey.net
·
1d
🧩
Browser Extensions
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
1d
·
Discuss:
Substack
🔍
eBPF
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
2d
💾
Retro Computing
Going Through
Snowden
Documents
, Part 1
libroot.org
·
3d
·
Discuss:
Lobsters
🔍
Digital Forensics
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
·
2d
·
Discuss:
Substack
🧩
Browser Extensions
Power
Automate
powerdevbox.com
·
1d
·
Discuss:
DEV
🐚
Shell Scripting
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help