Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📊 Threat Intelligence
APT Groups, IoCs, MITRE ATT&CK, Cyber Threat Landscape
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8082
posts in
181.4
ms
The
Convergence
of Risk: 2026
Cybersecurity
Outlook
dev.to
·
1d
·
Discuss:
DEV
🛡
Cybersecurity
Show HN:
Klint
– Linux Kernel Security
Scanner
saturnine.cc
·
3h
·
Discuss:
Hacker News
🔄
DevSecOps
Going Through
Snowden
Documents
, Part 1
libroot.org
·
1d
·
Discuss:
Lobsters
🕵️
OSINT
OpenAI
requires
ID
verification
for cybersecurity related tasks
openai.com
·
3d
·
Discuss:
Hacker News
🛡
Cybersecurity
Digital car
keys
are getting more
sophisticated
theverge.com
·
20h
🔬
Tech & Science
What to Do After a Crypto
Scam
(USA) Intelligence Cyber
Wizard
Explained
news.ycombinator.com
·
21h
·
Discuss:
Hacker News
🕵️
OSINT
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
1d
🛡️
AI Security
Show HN:
SubAnalyzer
subdomain
discovery and external attack surface map tool
subanalyzer.com
·
13h
·
Discuss:
Hacker News
🛠️
Product Security
AI Search
Visibility
Monitoring
Tools
open.forem.com
·
20h
·
Discuss:
DEV
👁️
Observability
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
·
10h
·
Discuss:
Hacker News
⛓️
Blockchain Security
Webspace
Invaders
matthiasott.com
·
9h
·
Discuss:
Lobsters
,
Hacker News
🛡️
AI Security
Delivering
a secure, open, and
sovereign
digital world
cloud.google.com
·
2d
☁️
Cloud Security
Re-Identification
vs
Anonymization
Strength
testingbranch.com
·
1d
·
Discuss:
Hacker News
🔒
Privacy Engineering
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
13h
·
Discuss:
Hacker News
⚛️
Quantum Security
Deep Learning for
Contextualized
NetFlow-Based
Network Intrusion Detection: Methods, Data, Evaluation and Deployment
arxiv.org
·
3d
📡
Edge Computing
Show HN: We
audited
AI agent
configs
on GitHub. Every one had security issues
clawhatch.com
·
1d
·
Discuss:
Hacker News
🛡️
AI Security
The Machine Majority:
Navigating
the Agentic
APT
in the 2026 Threat Landscape
dev.to
·
2d
·
Discuss:
DEV
🛡️
AI Security
The one structural shift
CISOs
must make before AI
outpaces
their security strategy
thenewstack.io
·
3d
☁️
Cloud Security
MCP
Directories
and
Gateways
: Mapping the Agentic Ecosystem
mcpstatus.io
·
2d
·
Discuss:
Hacker News
👁️
Observability
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
☁️
Cloud Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help