Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74182
posts in
1.70
s
Three
Investigative
Bottlenecks
β Three New Baseline Capabilities
forensicfocus.com
Β·
3d
π
Digital Forensics
Apple's '
Lockdown
Mode' Could Stop the Government From Breaking Into Your iPhone
lifehacker.com
Β·
3d
π
Hardware Security
Bye
Bye
Big Tech:
Extra
tips
bitsoffreedom.nl
Β·
3d
π΅
Digital Minimalism
December 2025βJanuary 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
Β·
3d
π¦
Malware Analysis
TruConfirm
: Ending Vulnerability Guesswork with Proof inside
ETM
blog.qualys.com
Β·
4d
π§ͺ
Jepsen Testing
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
Β·
4d
π¦
Malware Analysis
Beyond the Cloud: Why Personal Data
Sovereignty
Starts with Better
Encryption
dev.to
Β·
5d
Β·
Discuss:
DEV
π
Digital Privacy
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
Β·
1d
Β·
Discuss:
DEV
π‘
SonarQube
girste/CHIHUAUDIT
: π Linux security audit tool
github.com
Β·
3d
Β·
Discuss:
r/selfhosted
π
eBPF
Shostack
+ Associates >
Shostack
+ Friends Blog >
Bitlocker
, the FBI, and Risk
shostack.org
Β·
5d
π
Hardware Security
Data
Breach
Roundup (
Jan
30
discuss.privacyguides.net
Β·
2d
π
Digital Forensics
Breaking Down
CVE-2026-25049
: How TypeScript Types Failed
N8n
's Security
hetmehta.com
Β·
4d
Β·
Discuss:
Hacker News
π¦
Deno
Waterloo
Style
theprogrammersparadox.blogspot.com
Β·
2d
Β·
Discuss:
Hacker News
βοΈ
Systems Programming
Overview
datomic.com
Β·
3d
π
Bigtable
Characterizing
and Modeling the GitHub Security
Advisories
Review Pipeline
arxiv.org
Β·
3d
π
Quickwit
Securing
UALink: Introducing A
UALinkSec
Security Module
semiengineering.com
Β·
4d
π
WireGuard
How to make your Linux laptop more
secure
in 7
steps
howtogeek.com
Β·
3d
π
Hardware Security
**Abstract:** This paper introduces an automated regulatory compliance framework designed to streamline the approval process for wearable
physiological
monit
...
freederia.com
Β·
3d
π
PHI Accrual
roady001/Check-NotepadPlusPlusIOC
: Checks for indicators of compromise related to the Notepad++ supply chain attack.
github.com
Β·
4d
Β·
Discuss:
Hacker News
π
eBPF Verifier
Facing the Quantum Threat:
Cisco
βs Strategic Approach to
PQC
blogs.cisco.com
Β·
4d
βοΈ
Quantum Computing
Loading...
Loading more...
« Page 13
β’
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help