Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡 Cybersecurity
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18404
posts in
321.1
ms
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
3d
🔍
NTLM Forensics
AlertBERT
: A noise-robust alert
grouping
framework for simultaneous cyber attacks
arxiv.org
·
18h
🎯
Threat Hunting
Plato
's Form: Toward
Backdoor
Defense-as-a-Service for LLMs with Prototype Representations
arxiv.org
·
18h
💻
Local LLMs
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work – A Practical Guide from an IT
Technician
dev.to
·
5d
·
Discuss:
DEV
🔓
Hacking
OSS
Contributions
Welcome
vibesdiy.substack.com
·
3d
·
Discuss:
Substack
🔌
Operating system internals
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
📦
Container Security
From Automation to Infection (Part II): Reverse Shells, Semantic
Worms
, and Cognitive
Rootkits
in OpenClaw Skills
blog.virustotal.com
·
4d
·
Discuss:
blog.virustotal.com
🔓
Hacking
But .me can reveal actual values
pulled
from secret context without
revealing
the secret context.
dev.to
·
2d
·
Discuss:
DEV
🦠
Parasitic Archives
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
4d
🔓
Hacking
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
3d
·
Discuss:
Hacker News
,
r/programming
🧪
Binary Fuzzing
DKnife
toolkit abuses
routers
to spy and deliver malware since 2019
securityaffairs.com
·
1d
🌐
DNS Security
Code only says what it does
brooker.co.za
·
1d
·
Discuss:
Hacker News
📜
Proof Carrying Code
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🧪
Binary Fuzzing
Substack
data breach exposed users’
emails
and phone numbers
theverge.com
·
4d
·
Discuss:
Hacker News
🔓
Hacking
Substack
data
breach
confirmed: user phone numbers email addresses all stolen in attack, here's what we know
techradar.com
·
3d
🔓
Hacking
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
3d
·
Discuss:
Substack
🎯
Threat Hunting
MoaV
: Multi-Protocol Internet Censorship
Circumvention
Stack
moav.sh
·
6d
·
Discuss:
Hacker News
📞
WebRTC
Making
Pyrefly
Diagnostics
18x Faster
pyrefly.org
·
3d
·
Discuss:
Hacker News
🌳
Incremental Parsing
Breaking Down
CVE-2026-25049
: How TypeScript Types Failed
N8n
's Security
hetmehta.com
·
4d
·
Discuss:
Hacker News
🧪
CBOR Fuzzing
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
·
3d
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help