Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17816
posts in
229.8
ms
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
1d
·
Discuss:
Substack
✅
Checksum Validation
80% of Fortune 500 use active AI Agents:
Observability
, governance, and security shape the new
frontier
microsoft.com
·
5h
🎯
Threat Hunting
Google Distributed Cloud brings public-cloud-like
networking
to
air-gapped
environments
cloud.google.com
·
4h
🖥️
Self-hosted Infrastructure
Main
Content ||
Math
∩ Programming
jeremykun.com
·
1d
🧮
Kolmogorov Complexity
Windows
WLAN
Netsh
Report
apocryphos.com
·
21h
·
Discuss:
Hacker News
🕵️
Domain Enumeration
adrianosela/tsdmg
: Tailscale Domain Management Gateway: allow Tailscale nodes to retrieve public (Let's Encrypt) TLS certificates for custom domains.
github.com
·
15h
·
Discuss:
Hacker News
🌐
DNS Security
CCIE Security
DOO1/DOO2
, Stable Pass! & CCIE Security
Design1/Design2/Design3
, Stable Pass!
dev.to
·
4d
·
Discuss:
DEV
🏠
Homelab Pentesting
My Network Engineering Home
Lab
setup
dev.to
·
7h
·
Discuss:
DEV
🏠
HomeLab
ZK-Rollup
for
Hyperledger
Fabric: Architecture and Performance Evaluation
arxiv.org
·
16h
🌳
Archive Merkle Trees
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
1d
🚨
Incident Response
SHIELD.md
: A Security Standard for
OpenClaw
and AI Agents
blog.securitybreak.io
·
1d
🛡️
CLI Security
The 24-Hour Exploit: How
OpenClaw
Scanning
Ramped
Up from Zero to Global in a Day
terracenetworks.com
·
5h
·
Discuss:
Hacker News
🎫
Kerberos Exploitation
BeyondTrust
fixes critical
pre-auth
bug allowing remote code execution
securityaffairs.com
·
1d
🔓
Hacking
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
1d
·
Discuss:
Hacker News
📡
Network Protocol Design
Reverse Online
Guessing
Attacks on
PAKE
Protocols
arxiv.org
·
16h
🔐
PAKE Protocols
Sleeper Shells: How Attackers Are Planting Dormant Backdoors in
Ivanti
EPMM
defusedcyber.com
·
1d
·
Discuss:
Hacker News
📦
Container Security
Your AI Agents Are Running
Naked
expanso.io
·
4h
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Scientists Send Secure Quantum Keys Over 62 Miles of
Fiber
—Without
Trusted
Devices
singularityhub.com
·
23h
·
Discuss:
Hacker News
🔐
Quantum Security
Fake
7-Zip
downloads are turning home PCs into proxy
nodes
malwarebytes.com
·
1d
🎫
Kerberos Exploitation
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
1d
·
Discuss:
Hacker News
✅
Archive Fixity
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help