Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡 Cybersecurity
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18088
posts in
407.3
ms
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
4d
·
Discuss:
DEV
🎫
Kerberos Attacks
When the
SOC
Goes to
Deadwood
: A Night to Remember
blackhillsinfosec.com
·
4d
📟
Terminal Forensics
The Hidden Threat: Why Insider Risk Management Is the New
Frontier
of
Cyber
Defense
optiv.com
·
4d
🎯
Threat Hunting
The European Space Agency got
hacked
, and now we own the
domain
used!
scotthelme.ghost.io
·
6d
🎫
Kerberos History
CISA
pushes Federal agencies to
retire
end-of-support edge devices
securityaffairs.com
·
2d
🔐
Capability Systems
toborrm9/malicious
_extension_
sentry
: Malicious Extension Database
github.com
·
2d
·
Discuss:
Hacker News
🌐
WARC Forensics
Hacker
claims theft of data from 700,000
Substack
users; Company confirms breach
securityaffairs.com
·
3d
🔓
Hacking
It took a researcher fewer than 2 hours to
hijack
OpenClaw
thenewstack.io
·
3d
·
Discuss:
Hacker News
🔓
Hacking
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
🧪
Binary Fuzzing
OSS
Contributions
Welcome
vibesdiy.substack.com
·
2d
·
Discuss:
Substack
🔌
Operating system internals
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work – A Practical Guide from an IT
Technician
dev.to
·
4d
·
Discuss:
DEV
🔓
Hacking
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
📦
Container Security
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
4d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Substack
data breach exposed users’
emails
and phone numbers
theverge.com
·
4d
·
Discuss:
Hacker News
🔓
Hacking
But .me can reveal actual values
pulled
from secret context without
revealing
the secret context.
dev.to
·
1d
·
Discuss:
DEV
🦠
Parasitic Archives
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
3d
🔓
Hacking
US Gov
Directive
Cracks Down on
Unsupported
Edge Devices
decipher.sc
·
3d
🕵️
Domain Enumeration
Code only says what it does
brooker.co.za
·
1d
·
Discuss:
Hacker News
📜
Proof Carrying Code
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
3d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🧪
Binary Fuzzing
The
Agentic
Trust Framework: Zero Trust
Governance
for AI Agents
cloudsecurityalliance.org
·
4d
·
Discuss:
Hacker News
🔲
Cellular Automata
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help