Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🌐 Network Security
Protocol Design, Zero Trust, Packet Analysis, Intrusion Detection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17856
posts in
236.0
ms
Kugelblitz
:
Executable
, Cost-Aware Design-Space Exploration for Programmable Packet Pipelines
arxiv.org
·
15h
🐚
Bash Combinators
Path to Diversity: A Primer on
ISAC-izing
Commodity Wi-Fi for Practical Deployments
arxiv.org
·
15h
📻
Homebrew Protocols
When
Mains
Networking Fails, Use Phone
Wires
hackaday.com
·
5d
🕸️
Mesh Networks
Advanced br-ex Configuration with
Bonding
on
OpenShift
blog.stderr.at
·
5d
🔐
HSM Integration
Boost LLM Security: automated Red
Teaming
at Scale with
Promptfoo
blog.nviso.eu
·
5d
⚡
Proof Automation
I built a
cryptographic
memory layer for humans in Python tags: python,
opensource
, security, blockchain
dev.to
·
2d
·
Discuss:
DEV
🌳
Archive Merkle Trees
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csa) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
·
5d
·
Discuss:
Hacker News
🛡️
ARM TrustZone
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
4d
🌐
DNS Security
CISA orders federal agencies to rip out
EOL
edge kit before
cybercrooks
move in
theregister.com
·
4d
🔓
Hacking
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
3d
🔓
Hacking
CISA
pushes Federal agencies to
retire
end-of-support edge devices
securityaffairs.com
·
3d
🛡
Cybersecurity
Private Data Space Model
privatedata.space
·
5d
✅
Format Verification
Lab: Routing Between
VXLAN
Segments
blog.ipspace.net
·
4d
📡
Tape Networking
🔥 Building
Vigilo
: A 15MB File Integrity Monitor That Outperforms
OSSEC
dev.to
·
4d
·
Discuss:
DEV
✅
Archive Fixity
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
4d
·
Discuss:
Substack
🎯
Threat Hunting
Record-breaking 31.4
Tbps
DDoS
attack hits in November 2025, stopped by Cloudflare
securityaffairs.com
·
4d
🌐
DNS Security
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
6d
🛡
Cybersecurity
Amaranth-Dragon
: Targeted Cyber
Espionage
Campaigns Across Southeast Asia
blog.checkpoint.com
·
6d
🕵️
Penetration Testing
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
5d
·
Discuss:
Hacker News
🔓
Hacking
The AI
Visibility
Gap: a
Defining
Security Challenge for 2026
lmgsecurity.com
·
5d
🎯
Threat Hunting
Loading...
Loading more...
« Page 7
•
Page 9 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help