Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
4919
posts in
133.5
ms
Beyond the Cloud: Why Personal Data
Sovereignty
Starts with Better
Encryption
dev.to
·
4d
·
Discuss:
DEV
🔒
Digital Privacy
A Guide to building Advanced
RAGs
🏗️
dev.to
·
2d
·
Discuss:
DEV
💬
Prompt Engineering
Secure
AI infrastructure: call for information
gov.uk
·
6d
·
Discuss:
Hacker News
🛡️
AI Security
Breaking the Stack: How Adversarial Attacks
Bypass
LLM
Safeguards
pub.towardsai.net
·
4d
🛡️
AI Security
Incident Report:
CVE-2024-YIKES
nesbitt.io
·
5d
·
Discuss:
Hacker News
🛡
Vulnerability Management
Sandboxing
AI Agents in Linux
blog.senko.net
·
5d
·
Discuss:
Hacker News
📋
Infrastructure as Code (IaC)
Data
Integration
databricks.com
·
5d
📊
Data Pipelines (ETL)
Durable
Execution: Build reliable software in an
unreliable
world
thenewstack.io
·
6d
·
Discuss:
Hacker News
🔧
Code Refactoring Patterns
Malicious
MoltBot
skills used to push password-stealing malware
bleepingcomputer.com
·
6d
·
Discuss:
Hacker News
🛡️
AI Security
Draft
AV2
specification
and reference code
av2.aomedia.org
·
6d
·
Discuss:
Hacker News
⚙
Custom Rule Development
You Can't Secure What You Can't
Categorize
: A
Taxonomy
for AI Agents
osohq.com
·
6d
·
Discuss:
Hacker News
💬
AI Code Assistants
The Architecture of Open Source Applications (Volume 1)
Berkeley
DB
aosabook.org
·
6d
·
Discuss:
Hacker News
🔧
Code Refactoring Patterns
Everything I've
Done
with
OpenClaw
(So Far)
madebynathan.com
·
5d
·
Discuss:
Hacker News
🦭
Podman
Cyble
flags
rising cyber risks, urges Intel-led defence
securitybrief.com.au
·
6d
·
Discuss:
Hacker News
🛡
Vulnerability Management
The Notepad++ supply chain attack —
unnoticed
execution chains and new
IoCs
securelist.com
·
5d
·
Discuss:
Hacker News
📦
Dependency Confusion
Where the Work Goes When Agents
Arrive
dreamiurg.net
·
6d
·
Discuss:
Hacker News
⚡
AI-Driven DevOps
TrustTunnel
is an open-source, high-performance VPN protocol that's harder to
detect
and block
cnx-software.com
·
6d
·
Discuss:
Hacker News
🔒
Digital Privacy
Notepad
++ Supply
Chain
Attack Full Story
hackingpassion.com
·
6d
·
Discuss:
Hacker News
📦
Dependency Confusion
Building my
self-hosted
cloud coding agent
stanislas.blog
·
6d
·
Discuss:
Hacker News
📋
Infrastructure as Code (IaC)
BYOC
Isn't "SaaS
Anywhere
": A Design Playbook
tensor9.com
·
6d
·
Discuss:
Hacker News
☁️
Cloud Computing
Loading...
Loading more...
« Page 7
•
Page 9 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help