Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
4912
posts in
155.6
ms
CAP-SRP
: Building a Cryptographic Flight Recorder for AI Content
Refusals
β A Complete Implementation Guide
dev.to
Β·
2d
Β·
Discuss:
DEV
π¬
Prompt Engineering
Rails Authorization Beyond Models: Securing
Dashboards
and Service Controllers with
CanCanCan
dev.to
Β·
3d
Β·
Discuss:
DEV
π§
Code Refactoring Patterns
GKcodebase/API
_Architecture: API designs in
jaca
github.com
Β·
3d
Β·
Discuss:
DEV
π
API Integration
AI Will Not Save Cybersecurity: Why the Arms Race
Favors
Attackers
smarterarticles.co.uk
Β·
5d
Β·
Discuss:
Hacker News
π‘οΈ
AI Security
Security Update:
Transparency
Regarding
a Recent Support Ticket Incident
virtualizor.com
Β·
5d
Β·
Discuss:
Hacker News
π‘
Vulnerability Management
Digging into
UUID
,
ULID
, and implementing my own
atlas9.dev
Β·
4d
Β·
Discuss:
Hacker News
π
Decentralized Identity (DID)
Multi-layer defense for LLM agents inspired by
immune
systems (seeking
critique
)
gist.github.com
Β·
5d
Β·
Discuss:
Hacker News
π‘οΈ
AI Security
a
Pingora-based
reverse
proxy
(inspired by River)
sentinel.raskell.io
Β·
5d
Β·
Discuss:
Hacker News
π
Infrastructure as Code (IaC)
Making the truth cheaper than the
lie
in
ISO
9001
samrian.com
Β·
5d
Β·
Discuss:
Hacker News
β‘
AI-Driven DevOps
Protect Production SQL
Databases
from AI/LLM Agentic SQL
Query
Risks
rietta.com
Β·
5d
Β·
Discuss:
Hacker News
β‘
AI-Driven DevOps
RP2350
Hacking Challenge 2: Less
randomisation
, more correlation
raspberrypi.com
Β·
6d
Β·
Discuss:
Hacker News
π
Hardware Security
Microsoft finally
sends
TLS
1.0 and 1.1 to the cloud retirement home
theregister.com
Β·
6d
Β·
Discuss:
Hacker News
π
Digital Privacy
Detecting
backdoored
language models at scale
microsoft.com
Β·
4d
Β·
Discuss:
Hacker News
π‘οΈ
AI Security
Ransomware
gangs
focus on winning hearts and
minds
computerweekly.com
Β·
5d
Β·
Discuss:
Hacker News
π
Network Security
Clean
Coder
: The Dark Path (2017)
blog.cleancoder.com
Β·
4d
Β·
Discuss:
Hacker News
π§
Code Refactoring Patterns
Build a "Military-Grade" Network
Scanner
in Python (
Scapy
Tutorial)
npcap.com
Β·
5d
Β·
Discuss:
DEV
π
Network Security
Trust & Safety, built for whatβs next:
Musubi
x
Tremau
musubilabs.ai
Β·
4d
Β·
Discuss:
Hacker News
β
AI Ethics & Alignment
The LLM
spectrum
and
responsible
LLM use
martin.janiczek.cz
Β·
4d
Β·
Discuss:
Lobsters
,
Hacker News
π¬
Prompt Engineering
What
Happens
When AI Can
Write
All Your Software?
jakequist.com
Β·
4d
Β·
Discuss:
Hacker News
π€
spec-driven ai-assisted development
Building a Full-Stack Finance
Tracker
: My
MERN
Journey (Real Problems & Fixes) π°
finance-tracker-gamma-eight.vercel.app
Β·
6d
Β·
Discuss:
DEV
ποΈ
Alpine.js
Loading...
Loading more...
« Page 5
β’
Page 7 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help