Feeds to Scour
SubscribedAll
Scoured 15530 posts in 525.0 ms
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·2h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
ecurBitBridge: The Authentication Nightmare That Led Me to Build a Better Solution
blog.devops.dev·51m
🔐PAKE Protocols
Preview
Report Post
What is API Security?
securityscorecard.com·16h
📦Container Security
Preview
Report Post
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint
microsoft.com·4h
🎯NTLM Attacks
Preview
Report Post
Dissecting Digital Viruses: My First Steps in Malware Analysis
dev.to·1d·
Discuss: DEV
🦠Malware Analysis
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·19h
🕵️Penetration Testing
Preview
Report Post
Techniques of Modern Attacks
arxiv.org·1d
🎯Threat Hunting
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·17h
🎯Threat Hunting
Preview
Report Post
Why Universities Should Monetize Their IP Addresses Instead of Selling
circleid.com·16h
🌐IPFS
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.io·1d
🔬Binary Analysis
Preview
Report Post
Sentinel Isn’t a SIEM | It’s a Tenant Truth Engine™ | The RAHSI™ Proof-Pack Architecture
dev.to·17h·
Discuss: DEV
Archive Fixity
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·19h
🛡Cybersecurity
Preview
Report Post
The Silent AI Breach: How Data Escapes in Fragments
hackernoon.com·13h
🔓Hacking
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.com·1d·
Discuss: Hacker News
🔐PKI Archaeology
Preview
Report Post
Building scalable agentic assistants: A graph-based approach
thenewstack.io·15h
🌊Stream Processing
Preview
Report Post
Zoom fixed critical Node Multimedia Routers flaw
securityaffairs.com·15h
💣ZIP Vulnerabilities
Preview
Report Post
Weaponizing Calendar Invites: How Prompt Injection Bypassed Google Gemini’s Controls
miggo.io·20h·
Discuss: Hacker News
🎫Kerberos Attacks
Preview
Report Post
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes
rapid7.com·19h
🔐HSM Integration
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·17h
🔍Audio Forensics
Preview
Report Post
Threat hunters can’t waste time stumbling in the dark – they need real observability
techradar.com
·1d
🎯Threat Hunting
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help