Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Security Headers
HTTP Security, Web Protection, Browser Security, Content Policy
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19150
posts in
140.7
ms
Full
Disclosure
:
Asterisk
Security Release 22.8.2
seclists.org
·
17h
🔤
EBCDIC Privacy
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
·
1d
🔐
Capability Security
On
fediverse
content warnings and
filters
stefanbohacek.com
·
5h
📡
Feed Security
RFC 3092:
Etymology
of "
Foo
"
datatracker.ietf.org
·
6h
·
Discuss:
Hacker News
📝
ABNF Extensions
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
1d
🏺
Kerberos Archaeology
https://www.cl.cam.ac.uk/~
mgk25/ucs/examples/UTF-8-test.txt
cl.cam.ac.uk
·
1d
🔤
Character Encoding
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
·
6h
·
Discuss:
Substack
🌐
WARC Forensics
ELA-1637-1
tomcat9
security update
freexian.com
·
1d
📦
Container Security
7th
techdirt.com
·
1d
📡
DNS Archaeology
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
2h
·
Discuss:
Hacker News
🔒
Secure Boot
CVE-2025-6978: Arbitrary Code Execution in the
Arista
NG
Firewall
thezdi.com
·
3d
🎫
Kerberos Exploitation
Accessible
personal
websites
are easier than you think
goodinternetmagazine.com
·
2d
🖋
Typography
The Next Generation of
Cybersecurity
Protection
for Healthcare
hackernoon.com
·
4d
🛡
Cybersecurity
Firesheep
: Easy HTTP session
hijacking
from within Firefox (2010)
codebutler.com
·
2d
·
Discuss:
Hacker News
🔓
Password Cracking
Global SaaS Abuse Surge: U.S., Europe &
APAC
Targeted in Large‑Scale Phone‑Based
Phishing
blog.checkpoint.com
·
3d
🎫
Kerberos Attacks
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
2d
🌐
DNS Security
CAP-SRP
: Building a Cryptographic Flight Recorder for AI Content
Refusals
— A Complete Implementation Guide
dev.to
·
1d
·
Discuss:
DEV
🌳
Archive Merkle Trees
Gone Phishing, Got a Token: When Separate
Flaws
Combine
praetorian.com
·
4d
·
Discuss:
DEV
🎫
Kerberos Attacks
SIEM
Rules for detecting exploitation of vulnerabilities in
FortiCloud
SSO
kaspersky.com
·
3d
🧪
Protocol Fuzzing
Boost LLM Security: automated Red
Teaming
at Scale with
Promptfoo
blog.nviso.eu
·
3d
⚡
Proof Automation
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help