Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73060
posts in
575.1
ms
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
4d
🛡️
Packet Filtering
## Scalable Rule-Based Verification of Autonomous Weapon System Compliance with International
Humanitarian
Law Using
Compositional
Logic and Reinforcement Learning
freederia.com
·
3d
✅
Model Checking
From
guardrails
to governance: A CEO’s guide for
securing
agentic systems
technologyreview.com
·
5d
🛡️
AI Security
Apple @ Work: Platform
SSO
is the single most important technology Apple has
introduced
for the enterprise
9to5mac.com
·
2d
🔐
SGX Enclaves
Cyber Risk in 2026: From Today's
Pressures
to
Tomorrow
's Threats
bitsight.com
·
5d
🌐
Network Security
Rails Authorization Beyond Models: Securing
Dashboards
and Service Controllers with
CanCanCan
dev.to
·
3d
·
Discuss:
DEV
💼
Thrift
What I
haven
't
figured
out
macwright.com
·
2d
·
Discuss:
Hacker News
📝
Write-Ahead Logging
Heimdall
🛡️: The
All-Seeing
Code Guardian That Actually Fixes Your Problems
dev.to
·
15h
·
Discuss:
DEV
🏗️
Cranelift
The P in
PGP
isn’t for pain:
encrypting
emails in the browser
ckardaris.github.io
·
3d
·
Discuss:
Hacker News
🔒
Rustls
Anthropic’s newest model
excels
at finding security
vulnerabilities
—but raises fresh cybersecurity risks
fortune.com
·
3d
🛡️
AI Security
CISA
pushes Federal agencies to
retire
end-of-support edge devices
securityaffairs.com
·
2d
🔐
Hardware Security
Accounts get
taken
over without "
hacks
", step by step
systemweakness.com
·
4d
·
Discuss:
Hacker News
🔐
Capability Systems
8)
linuxiac.com
·
1d
🐧
Linux
marmot-protocol/marmot
: The
Marmot
Protocol is a messaging protocol that
specifies
how to do efficient end-to-end encrypted group messaging using Nostr's decentralized identity & relay network combined with the MLS Protocol.
github.com
·
1d
📡
MQTT
Discord will soon require face
scans
or ID for all users, or
restrict
access
9to5mac.com
·
15h
·
Discuss:
Hacker News
🔒
Digital Privacy
thirukguru/aws-perimeter
: A terminal-based AWS Security Scanner with 102+ security checks across VPC, IAM, S3, CloudTrail, containers (ECS/EKS), and AI attack detection. Detects dangerous IAM permissions, exposed secrets, misconfigured S3 buckets, container vulnerabilities, and emerging
LLMjacking
threats.
github.com
·
2d
·
Discuss:
r/golang
🛡️
AMD SEV
Walking
the
Tightrope
: The Hidden Security Risks of Code Agents
pub.towardsai.net
·
11h
🛡️
AI Security
Code only says what it does
brooker.co.za
·
2d
·
Discuss:
Hacker News
📚
Technical Writing
How network
modernization
enables AI success and quantum
readiness
techradar.com
·
1d
🏗️
System Design
The control
layer
for AI
blog.dottxt.ai
·
3d
·
Discuss:
Hacker News
🛡️
AI Security
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help