Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74101
posts in
617.3
ms
PCI
DSS
4.0.1 compliance with
HashiCorp
Vault and Vault Radar
hashicorp.com
·
5d
🏹
Robin Hood Hashing
LinkedIn Leverages GitHub Actions,
CodeQL
, and
Semgrep
for Code Scanning
infoq.com
·
2d
🔎
Quickwit
Bye
Bye
Big Tech:
Extra
tips
bitsoffreedom.nl
·
3d
📵
Digital Minimalism
TruConfirm
: Ending Vulnerability Guesswork with Proof inside
ETM
blog.qualys.com
·
4d
🧪
Jepsen Testing
AT&T
breach
data
resurfaces
with new risks for customers
malwarebytes.com
·
6d
🔍
Digital Forensics
Podcast
Spotlight
: The Threat from Quantum
Computers
assured.se
·
3d
⚛️
Quantum Computing
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
4d
🦠
Malware Analysis
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
23h
·
Discuss:
DEV
📡
SonarQube
Vulnerable
MCP Servers Lab: 9 ways to boost
ML
security
reversinglabs.com
·
4d
🛡️
AI Security
Stop
Hardcoding
Security Headers: Automate Your
CDN
Security with YAML
dev.to
·
16h
·
Discuss:
DEV
☁️
Cloudflare Workers
Digital
form
services by
Govforms
Digital
govforms.co.uk
·
3d
·
Discuss:
Hacker News
🔑
Kanidm
The quantum era is coming. Are we ready to
secure
it?
blog.google
·
3d
·
Discuss:
r/programming
⚛️
Quantum Computing
How One iPhone
Setting
Kept
Private Data Away from the FBI
gizchina.com
·
3d
🔐
Hardware Security
Shostack
+ Associates >
Shostack
+ Friends Blog >
Bitlocker
, the FBI, and Risk
shostack.org
·
5d
🔐
Hardware Security
Waterloo
Style
theprogrammersparadox.blogspot.com
·
2d
·
Discuss:
Hacker News
⚙️
Systems Programming
Open
Molten
Claw
idiallo.com
·
2d
·
Discuss:
Hacker News
🔓
Binary Exploitation
What is a
SOC
2 Compliance
Checklist
?
securityscorecard.com
·
5d
📝
Write-Ahead Logging
How to Change Active
Directory
User
Passwords
petri.com
·
4d
🌐
Network Security
roady001/Check-NotepadPlusPlusIOC
: Checks for indicators of compromise related to the Notepad++ supply chain attack.
github.com
·
4d
·
Discuss:
Hacker News
🔍
eBPF Verifier
Proteus
: Append-Only
Ledgers
for (Mostly) Trusted Execution Environments
arxiv.org
·
3d
🔄
Hardware Transactional Memory
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help