Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📡 Feed Security
RSS Injection, XML Attacks, Content Validation, Syndication Safety
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19317
posts in
256.9
ms
On
fediverse
content warnings and
filters
stefanbohacek.com
·
8m
📰
RSS Reading Practices
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 83
securityaffairs.com
·
2h
🦠
Malware Analysis
Security, Cloud Costs, and Bugs: How I
solved
the Developer's Three Biggest
Nightmares
in a single app
dev.to
·
1h
·
Discuss:
DEV
🧮
Z3 Solver
Building an RSS
Aggregator
with
Astro
raymondcamden.com
·
6d
📡
RSS Syndication
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
·
28m
·
Discuss:
Substack
🌐
WARC Forensics
Malicious
skills turn AI agent
OpenClaw
into a malware delivery system
the-decoder.com
·
1h
🔓
Hacking
Show HN:
Seedream
5.0: free AI image generator that claims strong text
rendering
seedream5ai.org
·
7h
·
Discuss:
Hacker News
🌊
Streaming Algorithms
Weekly
Bookmarks
inkdroid.org
·
10h
📚
MARC Archaeology
Full Disclosure: Certified
Asterisk
Security Release
certified-20.7-cert9
seclists.org
·
11h
❄️
Nixpkgs
Substack
data
breach
confirmed: user phone numbers email addresses all stolen in attack, here's what we know
techradar.com
·
2d
🛡
Cybersecurity
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
1d
🏺
Kerberos Archaeology
Best
infosec-related
long
reads
for the week of 1/31/26
metacurity.com
·
1d
🔓
Hacking
Chrysalis
,
Notepad
++, and Supply Chain Risk: What it Means, and What to Do Next
rapid7.com
·
3d
🔗
Supply Chain
I
Hacked
My Feed to Find
Undervalued
Content
xrayfeed.deepwalker.xyz
·
2d
·
Discuss:
Hacker News
🔃
Feed Algorithms
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
1d
🔓
Hacking
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
1d
🎯
Threat Hunting
InfoSec News Nuggets 02/05/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
3d
🛡
Cybersecurity
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
2d
·
Discuss:
Hacker News
📦
Container Security
Nitrogen
ransomware programmers lock themselves out of a payment — key management bug
encrypts
victims' data forever
tomshardware.com
·
1d
🔓
Hacking
Characterizing
and Modeling the GitHub Security
Advisories
Review Pipeline
arxiv.org
·
2d
🎯
Threat Hunting
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help