Feeds to Scour
SubscribedAll
Scoured 15532 posts in 931.1 ms
DNS Spotlight: The Silver Fox in the Henhouse
circleid.comยท1d
๐ŸŒDNS Security
Preview
Report Post
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments
dev.toยท1hยท
Discuss: DEV
๐Ÿ Homelab Pentesting
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.comยท21hยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Preview
Report Post
DNS OverDoS: Are Private Endpoints Too Private?
unit42.paloaltonetworks.comยท1d
๐ŸŒDNS over QUIC
Preview
Report Post
Agent Identity URI Scheme: Topology-Independent Naming and Capability-Based Discovery for Multi-Agent Systems
arxiv.orgยท4h
๐ŸคConsensus Protocols
Preview
Report Post
A new era of agents, a new era of posture
microsoft.comยท19h
๐ŸŽฏThreat Hunting
Preview
Report Post
Automating Privacy Code Reviews by Mapping How Software Handles Personal Data
hackernoon.comยท1d
๐Ÿ”Privacy Codecs
Preview
Report Post
Building a Multi-Tenant Metrics Pipeline for Thousands of Clients (with Thanos)
jamesrobb.caยท1dยท
๐Ÿ‘๏ธObservatory Systems
Preview
Report Post
Filtering as domain logic
blog.ploeh.dkยท2dยท
Discuss: r/programming
๐Ÿ—„๏ธDatabase Internals
Preview
Report Post
Zoom fixed critical Node Multimedia Routers flaw
securityaffairs.comยท15h
๐Ÿ’ฃZIP Vulnerabilities
Preview
Report Post
InfoSec News Nuggets
aboutdfir.comยท19h
๐Ÿ”“Hacking
Preview
Report Post
What is API Security?
securityscorecard.comยท16h
๐Ÿ“ฆContainer Security
Preview
Report Post
IP addresses through 2025
blog.apnic.netยท2d
๐Ÿ“กBGP Archaeology
Preview
Report Post
Building scalable agentic assistants: A graph-based approach
thenewstack.ioยท15h
๐ŸŒŠStream Processing
Preview
Report Post
Lab: Distributing Level-2 IS-IS Routes into Level-1 Areas
blog.ipspace.netยท1d
๐ŸงฉWASM Components
Preview
Report Post
Welcome 0x1eef (Robert) to the HardenedBSD Development Team!
hardenedbsd.orgยท17h
๐ŸกOpenBSD
Preview
Report Post
AttackMate: Realistic Emulation and Automation of Cyber Attack Scenarios Across the Kill Chain
arxiv.orgยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
LABScon25 Replay | How to Bug Hotel Rooms v2.0
sentinelone.comยท19h
๐Ÿ Homelab Pentesting
Preview
Report Post
Make Identity Threat Detection your security strategy for 2026
bleepingcomputer.comยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.comยท19h
๐Ÿ›กCybersecurity
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help