Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16848
posts in
736.8
ms
The
Styx
Architecture for
Distributed
Systems (1999)
inferno-os.org
·
1d
·
Discuss:
Hacker News
📡
Network Protocol Design
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
·
21h
·
Discuss:
Hacker News
🌐
DNS Security
Scientists Send Secure Quantum Keys Over 62 Miles of
Fiber
—Without
Trusted
Devices
singularityhub.com
·
16h
·
Discuss:
Hacker News
🔐
Quantum Security
Fake
7-Zip
downloads are turning home PCs into proxy
nodes
malwarebytes.com
·
1d
🎫
Kerberos Exploitation
The $5 Million Mistake: How a Single Phishing Email Brought a Federal
Contractor
to Its
Knees
syncsuptech.substack.com
·
8h
·
Discuss:
Substack
🔓
Hacking
Towards
Perfect
Vulnerability
Management System
worklifenotes.com
·
17h
·
Discuss:
Hacker News
✅
Archive Fixity
Show HN:
SubAnalyzer
subdomain
discovery and external attack surface map tool
subanalyzer.com
·
1d
·
Discuss:
Hacker News
🕵️
Domain Enumeration
Faster
than
Dijkstra
?
systemsapproach.org
·
1d
·
Discuss:
Hacker News
🕸️
Network Topology
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
5d
🎫
Kerberos Exploitation
HYDRA
:
Unearthing
"Black Swan" Vulnerabilities in LEO Satellite Networks
arxiv.org
·
1d
📊
PCAP Analysis
LLMs
Refuse
High-Cost Attacks but Stay
Vulnerable
to Cheap, Real-World Harm
expectedharm.github.io
·
9h
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
Show HN: Applying
OAuth/RBAC
patterns to secure AI agents
macawsecurity.ai
·
21h
·
Discuss:
Hacker News
🔒
Language-based security
Full Disclosure: Certified
Asterisk
Security Release
certified-20.7-cert9
seclists.org
·
2d
❄️
Nixpkgs
gvquiroz/cell-routing-from-scratch
: This repository is a learning-focused, incremental implementation of the
ingress
routing layer in a cell-based architecture.
github.com
·
5h
·
Discuss:
Hacker News
🔌
Interface Evolution
The
Convergence
of Risk: 2026
Cybersecurity
Outlook
dev.to
·
2d
·
Discuss:
DEV
🛡
Cybersecurity
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
3d
🔓
Hacking
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
4d
🎫
Kerberos Exploitation
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
1d
·
Discuss:
Hacker News
🔒
Secure Boot
Know Your Scientist:
KYC
as
Biosecurity
Infrastructure
arxiv.org
·
1d
🔗
Data Provenance
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
3d
🌍
Cultural Algorithms
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help