Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76447
posts in
803.2
ms
CockroachDB
v26.1
: Going Deep on Security and Compliance for our Most Demanding Customers
cockroachlabs.com
·
4d
📡
SonarQube
Zero Trust Security Model A Modern Approach To
Cybersecurity
techyall.com
·
4d
·
Discuss:
r/programming
🔺
CAP Theorem
How your smart tech could make you a target for
burglars
iotinsider.com
·
3d
🔐
Hardware Security
AI, defense tech and
cyber
: How safe is the future of
dual-use
defense- opinion
jpost.com
·
3d
🛡️
AI Security
Leaks and
Leakers
pxlnv.com
·
2d
🔐
Hardware Security
Former
Aegon
headquarters in The
Hague
to become national cybersecurity hub
nltimes.nl
·
2d
🛡️
Cybersecurity
Making
accounts
optional
in a local-first app
maxmntl.com
·
2d
·
Discuss:
Hacker News
📱
Pocketbase
Mobile App Flaw Could
Expose
2FA
Codes on Smartphones
zimperium.com
·
2d
🏷️
Memory Tagging
Blind
Trust in VS Code
Extensions
opista.com
·
3d
·
Discuss:
Hacker News
,
r/vscode
🦕
Deno
AI agents are about to make access control
obsolete
techradar.com
·
3d
🛡️
AI Security
Title: Just
patched
CVE-2026-21509
? Here's why you're still exposed
farathappsec.substack.com
·
5d
·
Discuss:
Substack
🔐
Hardware Security
WebAccessVL
: Making an Accessible Web via Violation-Conditioned
VLM
arxiv.org
·
2d
🌊
Warp
Critical Vulnerability Alert:
CVE-2025-40551
in
SolarWinds
Web Help Desk
bitsight.com
·
2d
🔍
eBPF Verifier
5
concrete
ways to help
AI-proof
your job
businessinsider.com
·
2d
💬
Prompt Engineering
How to
bake
cyber
resilience
into your startup culture
mitsloan.mit.edu
·
4d
🤖
Cyberpunk
VerIde
ECG
Biometrics
: Verification and Identification
arxiv.org
·
3d
🔢
Homomorphic Encryption
What’s New in
Tenable
Cloud Security: Multi-cloud Risk Analysis, Attack Surface
Assessments
, Improved IAM Security and More
tenable.com
·
5d
🔐
Capability Systems
What Is an Advanced
Persistent
Threat
securityscorecard.com
·
3d
🌐
Network Security
Cofense
Report Reveals AI-Powered
Phishing
Accelerated to One Attack Every 19 Seconds
cofense.com
·
3d
🛡️
AI Security
Why you should
consider
F#
asfaload.com
·
1d
·
Discuss:
Hacker News
📏
Linear Types
Loading...
Loading more...
« Page 16
•
Page 18 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help