Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Threat Intelligence
threat actors, IOCs, APT, threat hunting, TTP
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
1120
posts in
12.4
ms
Threat
Intelligence
Report:
APT
Operations Against AI Systems The Emerging Offensive Landscape Around Enterprise AI Proliferation The rapid proliferation of ent...
🔍
OSINT
krypt3ia.wordpress.com
·
6d
At Mythos Speed: A
Defender
's Playbook for the AI
Vulnerability
Surge in 2026
💥
Cyber Attacks
recordedfuture.com
·
2d
Introducing Bitsight Beacon™: Supply
Chain
Exposure Management for the SOC
🔴
Red Teaming
bitsight.com
·
5h
DEW #157 - Shai Hulud Goes Open Source, How Anthropic uses Claude and Underground Internet Cables
🔧
Hardware Hacking
detectionengineering.net
·
16h
Deploying & Using MISP for
Threat
Actor
Investigation: Profiling the Callisto Group
🔍
OSINT
medium.com
·
2d
Software Weaponization Raises DevSecOps Stakes
🔴
Red Teaming
devops.com
·
10h
Beyond Acceleration and Automation: How AI +
Intelligence
Changes
Cyber
Defense
💥
Cyberattack
malware.news
·
6d
reconCTI: A Proactive Approach to
Cyber-Threat
Intelligence
🔍
OSINT
arxiv.org
·
1d
Operation Dragon Whistle: UNG0002 Targets Chinese Academia via Weaponized Institutional Lure
🔓
Penetration Testing
seqrite.com
·
16h
·
r/blueteamsec
Six Signals for
Threat
Attribution
🔍
OSINT
zeltser.com
·
2d
Bulgaria fires up Google Cloud for national
cyber
security
💥
Cyberattack
computerweekly.com
·
15h
Building AI-assisted
threat
hunting
for npm supply
chain
attacks
💥
Exploit Development
derivai.substack.com
·
6d
·
r/netsec
Steganography Secrets:
Malware
Hidden in Plain Sight
🦠
Malware Analysis
cofense.com
·
23h
18th May –
Threat
Intelligence
Report
🔬
Security Research
research.checkpoint.com
·
2d
Now Live: The CrowdStrike 2026 Financial Services
Threat
Landscape
Report
💥
Cyberattack
crowdstrike.com
·
6d
GitHub confirms 3,800 internal repos stolen through poisoned VS Code extension as supply
chain
worm hits Microsoft’s Python SDK
💥
Exploit Development
venturebeat.com
·
10h
Cyber
attackers bypass traditional
defences
as ‘user-driven’ attacks surge, Bridewell warns
💥
Cyber Attacks
itsecurityguru.org
·
2d
Cyber
resilience defines SME competitiveness
💥
Cyber Attacks
techradar.com
·
14h
How Storm-2949 turned a
compromised
identity into a cloud-wide breach
🎭
Social Engineering
microsoft.com
·
2d
·
Hacker News
,
r/netsec
Week 20
🦠
Malware Analysis
thisweekin4n6.com
·
3d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help