Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Tetragon
eBPF Security, Observability, Runtime Enforcement, Cilium Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74012
posts in
492.8
ms
Zero crashes, zero
compromises
: inside the
HAProxy
security audit
haproxy.com
·
1d
🦀
Pingora
Flash Freezing Flash Boys:
Per-transaction
encryption to fight malicious
MEV
cointelegraph.com
·
3h
🔄
Hardware Transactional Memory
IBM
Introduces Autonomous Storage with New
FlashSystem
Portfolio Powered by Agentic AI
newsroom.ibm.com
·
6h
🔐
Capability Systems
A Guide to Securing Amazon Bedrock
AgentCore
with
Auth0
for AI Agents
auth0.com
·
18h
🔑
Kanidm
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
1d
·
Discuss:
Substack
🔐
Cryptography
Colab
marketplace.visualstudio.com
·
4h
🧮
Vector Databases
The Tech
Stack
I Use to Build and
Ship
Projects Fast as a Web Developer
convex.dev
·
7h
·
Discuss:
DEV
🌐
Web Development
Mojo
roadmap
docs.modular.com
·
20h
⚙️
SWC
Rust Memory Management: The
Playroom
Analogy
adacore.com
·
4h
·
Discuss:
Hacker News
🦀
Rust
OpenClaw
: The
Helpful
AI That Could Quietly Become Your Biggest Insider Threat
jamf.com
·
1d
🦅
Falco
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
1d
·
Discuss:
Hacker News
💬
Prompt Engineering
Towards Real-World Industrial-Scale Verification: LLM-Driven Theorem
Proving
on
seL4
arxiv.org
·
13h
📐
TLA+
The
Immutable
Ledger
: Data Integrity Through TypeScript & Design Patterns
dev.to
·
15h
·
Discuss:
DEV
🌳
Merkle Trees
Practical Strategies for
Securing
Web
APIs
in Modern Applications
dev.to
·
1d
·
Discuss:
DEV
🔌
APIs
Show HN: Applying
OAuth/RBAC
patterns to secure AI agents
macawsecurity.ai
·
1d
·
Discuss:
Hacker News
🛡️
AI Security
Someone's attacking
SolarWinds
WHD
to steal high‑privilege credentials - but we don't know who or how
theregister.com
·
20h
·
Discuss:
Hacker News
🛡️
AMD SEV
UNC1069
Targets Cryptocurrency Sector with New
Tooling
and AI-Enabled Social Engineering
cloud.google.com
·
1d
🦠
Malware Analysis
Kevin
Scott
: Building a
Sandbox
for Claude Code
thekevinscott.com
·
2h
⚛️
Calvin
New
microkernel
OS in 10 days: From zero to Google
Compute
Engine
seiya.me
·
1d
·
Discuss:
Hacker News
⚙️
Systems Programming
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
6h
·
Discuss:
Hacker News
🏹
Robin Hood Hashing
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help