Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74071
posts in
682.9
ms
Multi-Staged
Framework for Safety Analysis of
Offloaded
Services in Distributed Intelligent Transportation Systems
arxiv.org
·
15h
🔄
Distributed Systems
CIC-Trap4Phish
: A Unified Multi-Format Dataset for Phishing and
Quishing
Attachment Detection
arxiv.org
·
15h
🏹
Robin Hood Hashing
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
3d
💬
Prompt Engineering
Manic
Monday: A Day in the Life of Threat
Hunting
bitsight.com
·
5d
🔍
Digital Forensics
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
·
3d
·
Discuss:
Hacker News
👆
Fingerprinting
UK Construction Firm Hit by
Prometei
Botnet
Hiding in Windows Server
hackread.com
·
2d
🔐
Hardware Security
Hackers Use Signal
QR
Codes to
Spy
on Military and Political Leaders
hackread.com
·
1d
🔐
Hardware Security
The Indicator Guide to hunting for documents and files in open
buckets
, servers, and
directories
indicator.media
·
2d
🔍
Tantivy
AdviceNXT/sbp
:
Stigmergic
Blackboard Protocol: Environment-based coordination for AI agents
github.com
·
2d
·
Discuss:
DEV
🦓
Zookeeper
The Engagement Trap: 45
Adversarial
Patterns in Modern AI
Assistants
pastebin.com
·
4d
·
Discuss:
Hacker News
🛡️
AI Security
Weekly
OSINT
Review 2026.06
osintamy.medium.com
·
4d
🔍
Digital Forensics
Mojo
Jojo CTF OSINT Serial Killer chain
writeups
medium.com
·
1d
🔓
Binary Exploitation
IAM
Security
Audit
tolubanji.com
·
3d
·
Discuss:
DEV
🔒
Security
SaaS
System Design
dev.to
·
1d
·
Discuss:
DEV
🏗️
System Design
A
Horrible
Conclusion
addisoncrump.info
·
3d
·
Discuss:
Lobsters
,
Hacker News
🔓
Binary Exploitation
Stop Using
CAPTCHA
. Start
Measuring
Entropy.
dev.to
·
1d
·
Discuss:
DEV
📈
Prometheus
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
4d
🛡️
Cybersecurity
The
Air-Gapped
Chronicles: The
Poison
Pill — 47 Countries, 12,000 Rules, One AI Audit.
pub.towardsai.net
·
1d
💰
TigerBeetle
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
5d
🔍
eBPF
Bloody Wolf Targets Uzbekistan, Russia Using
NetSupport
RAT in
Spear-Phishing
Campaign
thehackernews.com
·
1d
🛡️
Packet Filtering
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help