Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
mjpawlowski's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82913
posts in
961.7
ms
Loading...
Subscribe
Build the rail! Save the
snails
! [Labour Together]
.docx
- Build+the+rail!+Save+the+
snails
!+[Labour+Together].pdf
static1.squarespace.com
·
3d
🦀
Rust
TAILS
OF
IRON
II
oddbug.co.uk
·
3d
🦀
Rust
I
scanned
15
vibe-coded
startups and 13 had critical security holes. Here's what I found (and why I'm building a fix)
seclure.com
·
4d
·
Discuss:
r/SideProject
🛡
Cybersecurity
Rublevka
Team: Anatomy of a Russian Crypto
Drainer
Operation
recordedfuture.com
·
4d
🛡
Cybersecurity
Security, Privacy and
Authentication
positive-intentions.com
·
6d
🛡
Cybersecurity
Claude Code for Infrastructure
fluid.sh
·
3d
·
Discuss:
Hacker News
🦀
Rust
Auditing
Outline.
Firsthand
lessons from comparing manual testing and AI security platforms
blog.doyensec.com
·
5d
🛡
Cybersecurity
Alice Releases
Caterpillar
After Catching Malicious
OpenClaw
Skills Used by 6,000+ Users
prnewswire.com
·
3d
🛡
Cybersecurity
Dank
Fedora
MiracleWM
& Other Fedora 44 Changes Approved
phoronix.com
·
4d
🐧
Linux
Switching
Back to Linux
robj.blog
·
6d
🐧
Linux
The First 90
Seconds
: How Early Decisions Shape Incident Response
Investigations
thehackernews.com
·
3d
🛡
Cybersecurity
RFC 9518 -
Centralization
,
Decentralization
, and Internet Standards
datatracker.ietf.org
·
4d
🛡
Cybersecurity
AI Will Not Save Cybersecurity: Why the Arms Race
Favors
Attackers
smarterarticles.co.uk
·
4d
🛡
Cybersecurity
Moltbook
, the AI social network, exposed human credentials due to
vibe-coded
security flaw
engadget.com
·
5d
🛡
Cybersecurity
CISA flags critical
SolarWinds
RCE
flaw as exploited in attacks
bleepingcomputer.com
·
4d
🛡
Cybersecurity
MoltBot
Skills exploited to
distribute
400+ malware packages in days
securityaffairs.com
·
5d
🛡
Cybersecurity
Leveraging Go to Detect
Phishing
Patterns in Legacy
Codebases
: A DevOps Approach
dev.to
·
4d
·
Discuss:
DEV
🛡
Cybersecurity
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
BigBotherLinux
: An
annoying
, yet functional Linux distribution
github.com
·
3d
·
Discuss:
Hacker News
🐧
Linux
Infostealers
without borders: macOS, Python
stealers
, and platform abuse
microsoft.com
·
5d
🛡
Cybersecurity
The NBA trade deadline has suddenly
gotten
busy
. Here’s why teams got active
nytimes.com
·
3d
🦀
Rust
Loading...
Loading more...
« Page 41
•
Page 43 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help