Feeds to Scour
SubscribedAll
Scoured 15825 posts in 245.3 ms
DNS Spotlight: The Silver Fox in the Henhouse
circleid.comยท1d
๐ŸŒDNS Security
Preview
Report Post
Building an Autonomous RFP Response Engine with Python
dev.toยท1hยท
Discuss: DEV
๐Ÿ”RegEx Engines
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.comยท14hยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Preview
Report Post
A new era of agents, a new era of posture
microsoft.comยท11h
๐ŸŽฏThreat Hunting
Preview
Report Post
DNS OverDoS: Are Private Endpoints Too Private?
unit42.paloaltonetworks.comยท1d
๐ŸŒDNS over QUIC
Preview
Report Post
AttackMate: Realistic Emulation and Automation of Cyber Attack Scenarios Across the Kill Chain
arxiv.orgยท21h
๐ŸŽฏThreat Hunting
Preview
Report Post
Automating Privacy Code Reviews by Mapping How Software Handles Personal Data
hackernoon.comยท17h
๐Ÿ”Privacy Codecs
Preview
Report Post
Building a Multi-Tenant Metrics Pipeline for Thousands of Clients (with Thanos)
jamesrobb.caยท1dยท
๐Ÿ‘๏ธObservatory Systems
Preview
Report Post
Zoom fixed critical Node Multimedia Routers flaw
securityaffairs.comยท7h
๐Ÿ’ฃZIP Vulnerabilities
Preview
Report Post
InfoSec News Nuggets
aboutdfir.comยท12h
๐Ÿ”“Hacking
Preview
Report Post
What is API Security?
securityscorecard.comยท8h
๐Ÿ“ฆContainer Security
Preview
Report Post
IP addresses through 2025
blog.apnic.netยท1d
๐Ÿ“กBGP Archaeology
Preview
Report Post
Filtering as domain logic
blog.ploeh.dkยท2dยท
Discuss: r/programming
๐Ÿ—„๏ธDatabase Internals
Preview
Report Post
Building scalable agentic assistants: A graph-based approach
thenewstack.ioยท8h
๐ŸŒŠStream Processing
Preview
Report Post
Welcome 0x1eef (Robert) to the HardenedBSD Development Team!
hardenedbsd.orgยท9h
๐ŸกOpenBSD
Preview
Report Post
Lab: Distributing Level-2 IS-IS Routes into Level-1 Areas
blog.ipspace.netยท19h
๐ŸงฉWASM Components
Preview
Report Post
LABScon25 Replay | How to Bug Hotel Rooms v2.0
sentinelone.comยท12h
๐Ÿ Homelab Pentesting
Preview
Report Post
Make Identity Threat Detection your security strategy for 2026
bleepingcomputer.comยท1d
๐ŸŽฏThreat Hunting
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.comยท9h
๐ŸŽฏThreat Hunting
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.comยท12h
๐Ÿ›กCybersecurity
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help