Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📡 Feed Security
RSS Injection, XML Attacks, Content Validation, Syndication Safety
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23068
posts in
215.2
ms
rumca-js/yafr
:
YAFR
- Yet Another Feed Reader
github.com
·
1d
📰
Feed Readers
InfoSec News Nuggets 02/12/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
3h
🌐
DNS Security
Introducing
Markdown
for Agents
blog.cloudflare.com
·
2h
·
Discuss:
Hacker News
📡
RSS Automation
Software Testing at the Network
Layer
: Automated
HTTP
API Quality Assessment and Security Analysis of Production Web Applications
arxiv.org
·
2d
🧪
Protocol Fuzzing
Trusting
Trust in the
Fediverse
evilmaid.net
·
22h
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
DMPs
and Research Organisation Registry (RoR)
identifers
dcc.ac.uk
·
7h
📡
DNS Archaeology
Forward to Hell? On
Misusing
Transparent DNS
Forwarders
For Amplification Attacks
labs.ripe.net
·
9h
🌐
DNS Security
LummaStealer
activity
spikes
post-law enforcement disruption
securityaffairs.com
·
1h
🚨
Incident Response
I bought, I saw, I
attended
: a quick guide to
staying
scam-free at the Olympics
kaspersky.com
·
1h
🛣️
BGP Hijacking
A single
stable
kernel
for Thursday
lwn.net
·
2h
🔍
eBPF
A Match Made in
Heaven
: How Valentine’s Day Fuels
Seasonal
Phishing Attacks
bitsight.com
·
20h
🎯
Threat Hunting
Real-Time AI Streaming in Production: What We Built at
Helpmaton
metaduck.com
·
1h
🌊
Streaming Systems
Various levels of authentication for
gated
medical content on
pharmaceutical
websites
thomasrigby.com
·
2h
🛡️
Security Headers
Stop Optimizing for
Clicks
: The Case for
Uplift
Modeling in Notifications
hackernoon.com
·
11h
🎯
Content Recommendation
Artificial
Insecurity
: threats to information
integrity
accessnow.org
·
6h
💻
Local LLMs
Investigation on the
EmEditor
Supply Chain
Cyberattack
stormshield.com
·
3d
📡
Feed Archaeology
Surfshark
partners with
Internews
to protect journalists and activists with free VPN access
techradar.com
·
1d
🔓
Hacking
Fonto
Why & How: Custom endpoint response
validators
fontoxml.com
·
5h
✅
Format Verification
AMOS
infostealer
targets macOS through a popular AI app
bleepingcomputer.com
·
2h
🔓
Password Cracking
Four Seconds to Botnet - Analyzing a Self
Propagating
SSH Worm with
Cryptographically
Signed C2 [Guest Diary], (Wed, Feb 11th)
isc.sans.edu
·
14h
🏠
Homelab Pentesting
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help