Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Capability Systems
Object Capabilities, Access Control, Security Models, seL4
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19421
posts in
1.05
s
AI agents are about to make access control
obsolete
techradar.com
·
2h
🔒
WASM Capabilities
Can Developers
rely
on LLMs for Secure
IaC
Development?
arxiv.org
·
9h
🔒
WASM Capabilities
Staying
secure and simple in a
complex
world
tailscale.com
·
21h
💾
Persistence Strategies
Beyond
ACLs
: Mapping Windows Privilege Escalation Paths with
BloodHound
synacktiv.com
·
2d
🎯
NTLM Attacks
Multi-layer defense for LLM agents inspired by
immune
systems (seeking
critique
)
gist.github.com
·
4h
·
Discuss:
Hacker News
🎯
Threat Hunting
Engineering Beyond the Control
Paradigm
dev.to
·
16h
·
Discuss:
DEV
⚙️
systems theory
Microsoft
SDL
:
Evolving
security practices for an AI-powered world
microsoft.com
·
21h
🎯
Threat Hunting
The
3Cs
: A Framework for AI Agent Security
docker.com
·
12h
🎯
Threat Hunting
AI and the
Reconfiguration
of the
Counterintelligence
Battlefield
tandfonline.com
·
3h
🔍
Vector Forensics
Vulnerable
MCP Servers Lab: 9 ways to boost
ML
security
reversinglabs.com
·
13m
🔓
Hacking
Need for Speed: AI, Security, and
Productivity
pentesterlab.com
·
1d
🎯
Performance Proofs
The Engineer's Guide to
Elastic
Detections
as Code
elastic.co
·
14h
✅
Archive Validation
Empowering
the
RAF
Association with Next-Generation Cyber Resilience
paloaltonetworks.com
·
20h
🔐
Archive Encryption
What is a
SOC
2 Compliance
Checklist
?
securityscorecard.com
·
16h
⚖️
Legal Compliance
Devices
windowsir.blogspot.com
·
1d
·
Discuss:
Blogger
💿
DAT Forensics
The Next Generation of
Cybersecurity
Protection
for Healthcare
hackernoon.com
·
4h
🛡
Cybersecurity
Lightening
the robotic
scraping
: Insights for a ‘green’ cache from the Software Heritage archive
diff.wikimedia.org
·
15h
🏺
ZIP Archaeology
The €10
Mirror
: Why Enterprise Security Looks Like a
Kid
’s Toy
labs.itresit.es
·
7h
·
Discuss:
Hacker News
🏺
ZIP Archaeology
Streamlining
Authentication Flows: Automating with Python for Enterprise
QA
dev.to
·
5h
·
Discuss:
DEV
⚡
Proof Automation
Data
Integration
databricks.com
·
19h
🚚
Data Migration
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help