Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17842
posts in
458.5
ms
Linux 7.0 Adds support For
BPF
Filtering To IO_
uring
phoronix.com
·
7h
🔍
eBPF
SolarWinds
Web Help Desk
Exploitation
elastic.co
·
20h
🎫
Kerberos Exploitation
A Declaration of
Interdependence
of
Cyberspace
carlheath.se
·
2d
📟
Historical Protocols
Force
Multiplier
in Cybersecurity: Sharing Intelligence in a Complex Threat
Landscape
cyberthreatalliance.org
·
9h
🎯
Threat Hunting
Peering
Market at a Glance: Trends, Transformations, and the Regional Dynamics of Internet
Interconnection
labs.ripe.net
·
12h
📡
BGP Archaeology
A
practical
systems engineering guide:
Architecting
AI-ready infrastructure for the agentic era
thenewstack.io
·
22h
⚙️
TLA+
DNS-PERSIST-01
; Handling Domain Control Validation in a short-lived
certificate
World
scotthelme.ghost.io
·
1d
🌐
DNS over QUIC
Improving
your response to
vulnerability
management
ncsc.gov.uk
·
1d
💾
Persistence Strategies
Connectivity
case study: When the
unthinkable
happens
blog.arelion.com
·
10h
🕸️
Mesh Networking
Rebuilding
my home network with
VLANs
and 10Gbps
clintonboys.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
,
r/homelab
🖥
Home Lab Setup
SYTECH
Delivers Global Digital
Forensics
Workshop To Inspire The Next Generation
forensicfocus.com
·
10h
🔐
PKI Archaeology
Formal
Methods
Practice and Theory
adacore.com
·
6h
·
Discuss:
Hacker News
✅
Formal Methods
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
·
1d
🛡
Cybersecurity
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
1d
·
Discuss:
Substack
🛡️
eBPF Security
The
OWASP
LLM Top: A Practical Attack Guide (with 122 real attack
techniques
)
news.ycombinator.com
·
8h
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
How One Engineer Turned Saudi Cloud
Compliance
from a 6-Month
Bottleneck
into a 2-Week Workflow
hackernoon.com
·
7h
🔍
BitFunnel
Choosing
the Right Strategy: Cold Boot
Forensics
vs Live System Analysis
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Zero Trust for Multi-RAT IoT: Trust
Boundary
Management in
Heterogeneous
Wireless Network Environments
arxiv.org
·
15h
🛡️
ARM TrustZone
AI
vastly
reduced stress of IPv6
migrations
in university experiment
theregister.com
·
8h
·
Discuss:
Hacker News
🤖
Network Automation
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
1d
·
Discuss:
Substack
✅
Checksum Validation
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help