Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28879
posts in
23.6
ms
Security-focused
platform with
hardened
architecture
securos.org
·
17h
·
Discuss:
Hacker News
🛡️
ARM TrustZone
Høiland-Jørgensen
: The inner workings of TCP zero-copy
lwn.net
·
5h
📡
Network Protocol Design
MCP Security in 2026: Lessons From Real
Exploits
and Early
Breaches
hackernoon.com
·
5h
🔓
Hacking
Blockchain-Enabled
Routing
for Zero-Trust
Low-Altitude
Intelligent Networks
arxiv.org
·
20h
🤝
Distributed Consensus
Guidelines for Writing
Cryptography
Specifications
cfrg.github.io
·
1h
·
Discuss:
Hacker News
📋
Format Specification
Cyber Security
Offense
and Defense Home
Lab
mahimavi.medium.com
·
2d
🏠
Homelab Security
Understanding the
A2A
Protocol
for Agentic AI in Network Operations
networkphil.com
·
8h
🌐
NetworkProtocols
Suggested
IETF
125 Sessions for Getting Familiar with New Topics
ietf.org
·
4h
📡
Network Protocol Design
Beyond Cracking the Handshake: A Technical Analysis of
WPA2
Weaknesses
and Router Exposure
hackernoon.com
·
13h
🔓
Hacking
Vulnerabilities in CGM
CLININET
and CGM
NETRAAD
software
cert.pl
·
14h
🔓
Hacking
I've Seen This IP: A Practical
Intersection
Attack Against
Tor
Introduction Circuits and Hidden Services
arxiv.org
·
20h
🛣️
BGP Hijacking
2nd March – Threat Intelligence Report
research.checkpoint.com
·
8h
🎯
Threat Hunting
Network Performance Monitoring: From Technical
Function
to Strategic
Capability
catchpoint.com
·
1d
·
Discuss:
DEV
📡
Network Monitoring
IPv6-Mostly
Networks: Deployment and Operations
Considerations
datatracker.ietf.org
·
1d
·
Discuss:
Hacker News
📡
Network Protocol Design
CyberSci
Nationals
2025-2026
ctftime.org
·
1d
💻
CS
Valuable
News
vermaden.wordpress.com
·
8h
🔌
Operating system internals
Beyond the
blank
slate
: how Cloudflare accelerates your Zero Trust journey
blog.cloudflare.com
·
19h
🖥️
Self-hosted Infrastructure
How ‘silent
probing
’ can make your security playbook a
liability
cyberscoop.com
·
14h
🎯
Threat Hunting
APT37
combines cloud storage and USB implants to
infiltrate
air-gapped systems
securityaffairs.com
·
12h
🔌
Operating system internals
APRICOT
2026
keynotes
: Agency, memory, and getting IPv6 done
blog.apnic.net
·
1d
🌊
Streaming Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help