Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Firewalls, Intrusion Detection, Packet Analysis, VPN
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76591
posts in
720.1
ms
IoT
Data Collection in
ATEX
Environments
iotbusinessnews.com
·
2d
🔌
Embedded Systems
PCI
DSS
4.0.1 compliance with
HashiCorp
Vault and Vault Radar
hashicorp.com
·
3d
🔒
Security
Malicious
use of virtual machine infrastructure
sophos.com
·
3d
🛡️
AMD SEV
RFC 9518 -
Centralization
,
Decentralization
, and Internet Standards
datatracker.ietf.org
·
3d
🔄
Distributed Systems
Agents
Rule
of Two: A
Practical
Approach to AI Agent Security
ai.meta.com
·
2d
🛡️
AI Security
MCP in
Burp
Suite: From
Enumeration
to Targeted Exploitation
dev.to
·
1d
·
Discuss:
DEV
📦
Folly
We are
QA
Engineers
now
serce.me
·
2d
·
Discuss:
Lobsters
,
Hacker News
,
r/programming
🧪
Testing
Leveraging Go for Robust
Phishing
Pattern
Detection in Enterprise Security
dev.to
·
3d
·
Discuss:
DEV
🏹
Robin Hood Hashing
Not Just Scale
brooker.co.za
·
2d
🏗️
System Design
Everyday
Threat
Modeling
danielmiessler.com
·
3d
🛡️
AI Security
mmguero-dev/Malcolm
: Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (
PCAP
files), Zeek logs and Suricata alerts.
github.com
·
2d
🔍
eBPF
How to Change Active
Directory
User
Passwords
petri.com
·
2d
🔒
Security
**Abstract:** The escalating threat of nation-state
sponsored
phishing campaigns demands a
proactive
and adaptive defense strategy. Traditional signature-bas...
freederia.com
·
3d
🛡️
AI Security
**Abstract:** Open Source Embedded Systems (
OSES
)
proliferation
presents significant security challenges due to the complexity of their supply chains and rap...
freederia.com
·
3d
📡
SonarQube
CVE-2025-22225 in
VMware
ESXi
now used in active ransomware attacks
securityaffairs.com
·
2d
🦅
Falco
Facing the Quantum Threat:
Cisco
’s Strategic Approach to
PQC
blogs.cisco.com
·
1d
⚛️
Quantum Computing
Microsoft
SDL
:
Evolving
security practices for an AI-powered world
microsoft.com
·
3d
🛡️
AI Security
Show HN: Gateway – An open-source proxy to
securely
handle
BYOK
keys
github.com
·
3d
·
Discuss:
Hacker News
🚦
Traefik
AWS
intruder
achieved
admin access in under 10 minutes thanks to AI assist, researchers say
theregister.com
·
2d
·
Discuss:
Hacker News
,
Hacker News
🛡️
AI Security
Stop
connecting
smart
bulbs
to your main Wi-Fi: The safer way to set them up
howtogeek.com
·
3d
🏠
Home Automation
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help