Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Tetragon
eBPF Security, Observability, Runtime Enforcement, Cilium Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76495
posts in
803.9
ms
How I Built a Physical Kill-Switch for CI/CD
Pipelines
to Stop
SolarWinds-Style
Attacks
blog.devops.dev
ยท
2d
๐ก๏ธ
Intel SGX
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
ยท
1d
๐ฆ
Falco
microsoft/litebox
: A security-focused library OS
supporting
kernel- and user-mode execution
github.com
ยท
23h
ยท
Discuss:
Hacker News
,
r/programming
๐
BPF LSM
IAM
Security
Audit
tolubanji.com
ยท
46m
ยท
Discuss:
DEV
๐
Security
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
ยท
15h
๐
ChaCha20
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
ยท
15h
๐ฆ
Falco
Linux Kernel
Runtime
Guard Reaches 1.0: A Major
Milestone
for
Runtime
Kernel Security
linuxjournal.com
ยท
1d
๐
BPF LSM
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
ยท
13h
ยท
Discuss:
Hacker News
#๏ธโฃ
Perfect Hashing
OpenAI launches GPTโ
5.3-Codex
with faster and
broader
agentic coding capabilities
alternativeto.net
ยท
2h
๐๏ธ
Pavex
**Abstract:** This paper explores a novel approach to enhancing key security in
Elliptic
Curve Cryptography (
ECC
) by leveraging insights from the geometric i...
freederia.com
ยท
1d
๐ข
Homomorphic Encryption
Legendary Windows dev codes demos and games for ancient โWar Gamesโ monitor โ interfaces with the
HP1345a
vector display using an ESP32
microcontroller
tomshardware.com
ยท
1h
๐พ
Retro Computing
eBPF
is Eating Kubernetes Security: Why Every
DevOps
Engineer Should Care in 2026
dev.to
ยท
2d
ยท
Discuss:
DEV
๐
eBPF
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
ยท
13h
๐
Userspace TCP Stacks
Metasploit
Wrap-Up
02/06/2026
rapid7.com
ยท
19h
๐ฆ
Falco
The
Intent-Verification
Gap in CI/CD: Why
Authentication
Fails Under Real Attacks
dev.to
ยท
6h
ยท
Discuss:
DEV
๐
Security
Automating
GOAD
and Live Malware Labs
elastic.co
ยท
2d
๐
eBPF
Microsoft Releases
Crescent
Cryptographic
Library
i-programmer.info
ยท
1d
๐
Digital Privacy
Delivering
a secure, open, and
sovereign
digital world
cloud.google.com
ยท
21h
๐
Digital Privacy
How
Convera
built fine-grained API authorization with Amazon Verified
Permissions
aws.amazon.com
ยท
1d
๐
Tauri IPC
CVA6-CFI
: A First Glance at RISC-V Control-Flow Integrity Extensions
arxiv.org
ยท
1d
๐ก๏ธ
Intel CET
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help