Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19494
posts in
223.5
ms
The control
layer
for AI
blog.dottxt.ai
·
8h
·
Discuss:
Hacker News
🔒
WASM Capabilities
Persistent
Human Feedback, LLMs, and Static
Analyzers
for Secure Code Generation and Vulnerability Detection
arxiv.org
·
1d
🐛
Fuzzing
OSINT-How
Public Information
Becomes
Powerful Intelligence
medium.com
·
13h
🔎
OSINT Techniques
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
·
5h
🔐
Capability Security
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
7h
·
Discuss:
Hacker News
🧪
Binary Fuzzing
CAP-SRP
: Building a Cryptographic Flight Recorder for AI Content
Refusals
— A Complete Implementation Guide
dev.to
·
6h
·
Discuss:
DEV
🌳
Archive Merkle Trees
**Abstract:** This research introduces a novel framework for formally verifying distributed consensus protocols, specifically
Raft
, using Lean 4 and
dependen
...
freederia.com
·
16h
🤝
Consensus Protocols
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
2d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Operant
AI targets ‘
shadow
’ AI agents with real-time security platform
thenewstack.io
·
14h
🎯
Threat Hunting
Beyond the Hype: 9 Cybersecurity Realities
CIOs
Must Face at
RSAC
2026
avoa.com
·
7h
🎯
Threat Hunting
All About
OWASP
Top 10 for
Agentic
AI Applications
infosecwriteups.com
·
2d
🔒
WASM Capabilities
CISA orders federal agencies to rip out
EOL
edge kit before
cybercrooks
move in
theregister.com
·
19h
🔓
Hacking
The anti-Bayesian is standing at the back window with a shotgun, scanning for priors coming over the hill, while a million assumptions just walk right into his house through the front door. (also, an interesting point by
Yann
LeCun
about human language)
statmodeling.stat.columbia.edu
·
17h
🔲
Cellular Automata
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
·
2d
·
Discuss:
Lobsters
,
Hacker News
🌳
Archive Merkle Trees
Enigma
: Decentralized Computation Platform with
Guaranteed
Privacy
dev.to
·
2h
·
Discuss:
DEV
🤐
Secure Multiparty
InfoSec News Nuggets 02/06/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
18h
🛡
Cybersecurity
SIEM
Rules for detecting exploitation of vulnerabilities in
FortiCloud
SSO
kaspersky.com
·
1d
🧪
Protocol Fuzzing
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
7h
🏺
Kerberos Archaeology
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
20h
·
Discuss:
Hacker News
,
r/programming
🧪
Binary Fuzzing
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help