Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74659
posts in
563.6
ms
Why more CEOs and
boards
are
worrying
about security: 'The risk is everywhere.'
businessinsider.com
Β·
1d
π
Hardware Security
Free
Antivirus
Vs
Paid
Antivirus
β Do You Really Need To Pay In 2026?
techtroduce.com
Β·
2d
Β·
Discuss:
r/computers
π
Capability Systems
From
guardrails
to governance: A CEOβs guide for
securing
agentic systems
technologyreview.com
Β·
5d
π‘οΈ
AI Security
Cyber Risk in 2026: From Today's
Pressures
to
Tomorrow
's Threats
bitsight.com
Β·
5d
π
Network Security
The P in
PGP
isnβt for pain:
encrypting
emails in the browser
ckardaris.github.io
Β·
3d
Β·
Discuss:
Hacker News
π
Rustls
What I
haven
't
figured
out
macwright.com
Β·
2d
Β·
Discuss:
Hacker News
π
Write-Ahead Logging
Rails Authorization Beyond Models: Securing
Dashboards
and Service Controllers with
CanCanCan
dev.to
Β·
3d
Β·
Discuss:
DEV
πΌ
Thrift
Heimdall
π‘οΈ: The
All-Seeing
Code Guardian That Actually Fixes Your Problems
dev.to
Β·
10h
Β·
Discuss:
DEV
ποΈ
Cranelift
I
switched
from
LastPass
to this open-source password manager that's more secure
makeuseof.com
Β·
2d
π
WireGuard
INTERNATIONAL EDITION
securityaffairs.com
Β·
1d
π
Hardware Security
Flickr
moves to
contain
data exposure, warns users of phishing
securityaffairs.com
Β·
1d
π
IndieWeb
Walking
the
Tightrope
: The Hidden Security Risks of Code Agents
pub.towardsai.net
Β·
6h
π‘οΈ
AI Security
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
Β·
4d
Β·
Discuss:
Hacker News
π
Capability Systems
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
Β·
3d
Β·
Discuss:
Hacker News
#οΈβ£
Perfect Hashing
Malicious
Agent Skills in the Wild: A Large-Scale Security
Empirical
Study
arxiv.org
Β·
20h
π‘οΈ
AI Security
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
Β·
2d
Β·
Discuss:
Blogger
π¦
Malware Analysis
Telcos
aren't saying how they
fought
back against China's Salt Typhoon attacks
theregister.com
Β·
1d
π
Hardware Security
marmot-protocol/marmot
: The
Marmot
Protocol is a messaging protocol that
specifies
how to do efficient end-to-end encrypted group messaging using Nostr's decentralized identity & relay network combined with the MLS Protocol.
github.com
Β·
1d
π‘
MQTT
8)
linuxiac.com
Β·
1d
π§
Linux
Discord will soon require face
scans
or ID for all users, or
restrict
access
9to5mac.com
Β·
11h
Β·
Discuss:
Hacker News
π
Digital Privacy
Loading...
Loading more...
« Page 9
β’
Page 11 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help