Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 API Security
Authentication, Authorization, Rate Limiting, API Gateway
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80180
posts in
496.8
ms
HTTP
Explained: How the Web
Communicates
Behind the Scenes
dev.to
·
3d
·
Discuss:
DEV
🎨
API Design
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
1d
·
Discuss:
DEV
🎭
Social Engineering
boinkor-net/tsnsrv
: A reverse proxy that exposes services on your tailnet (as their own tailscale participants)
github.com
·
4d
🎨
API Design
Bladestar2105/IPTV-Manager
: A powerful IPTV management panel that
aggregates
multiple IPTV providers into customized playlists for end users. Built with Node.js, Express, and SQLite.
github.com
·
6d
·
Discuss:
r/selfhosted
🎨
API Design
Alternatives to
ingress-nginx
controller
reddit.com
·
6d
·
Discuss:
r/kubernetes
☁
Cloud Infrastructure
Sandboxing
AI agents in Linux
blog.senko.net
·
6d
🤖
AI
I made my own encrypted
tunnels
with
NodePass
because I don't trust Cloudflare
xda-developers.com
·
6d
☁
Cloud Infrastructure
AWS
intruder
achieved
admin access in under 10 minutes thanks to AI assist, researchers say
theregister.com
·
5d
·
Discuss:
Hacker News
,
Hacker News
☁
Cloud Infrastructure
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
4d
🎭
Social Engineering
Coding Agents Need More Than
Examples
. They Need
Guardrails
.
medium.com
·
6d
·
Discuss:
Hacker News
🎨
API Design
Four new vulnerabilities found in
Ingress
NGINX
csoonline.com
·
4d
☁
Cloud Infrastructure
AI agents in enterprises: Best practices with Amazon
Bedrock
AgentCore
aws.amazon.com
·
6d
☁
Cloud Infrastructure
Microsoft
SDL
:
Evolving
security practices for an AI-powered world
microsoft.com
·
6d
🎨
API Design
I've blocked every
IoT
device from the internet with this simple
router
rule
makeuseof.com
·
6d
🎭
Social Engineering
Why Smart People Fall For
Phishing
Attacks
unit42.paloaltonetworks.com
·
6d
🎭
Social Engineering
Setting Up
Auth0
Custom
Domains
: A Complete Guide to DNS and SDK Configuration
auth0.com
·
6d
☁
Cloud Infrastructure
Assured
Data Protection Introduces
Assured
Backup with
BackBox
-- a Network and Security Configuration Protection Service
prnewswire.com
·
6d
☁
Cloud Infrastructure
When Cloud
Outages
Ripple
Across the Internet
thehackernews.com
·
6d
☁
Cloud Infrastructure
What Is an Advanced
Persistent
Threat
securityscorecard.com
·
6d
🎭
Social Engineering
From
credentials
to cloud admin in 8 minutes: AI
supercharges
AWS attack chain
csoonline.com
·
6d
☁
Cloud Infrastructure
Loading...
Loading more...
« Page 11
•
Page 13 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help