Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
10226
posts in
110.2
ms
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
1d
·
Discuss:
Hacker News
🔓
Binary Exploitation
SynAT
: Enhancing Security Knowledge Bases via Automatic
Synthesizing
Attack Tree from Crowd Discussions
arxiv.org
·
1d
🕸️
Knowledge Graphs
The
Kitchen
Sink
Engineer
blog.gorewood.games
·
22h
🧩
Low-code
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work – A Practical Guide from an IT
Technician
dev.to
·
2d
·
Discuss:
DEV
🌐
Network Security
Securing
GenAI: Vol. 8 — Deploying AI apps
securely
pub.towardsai.net
·
10h
🤖
AI Coding Tools
AI Is
Stress-Testing
Software Engineering as a
Profession
learningloom.substack.com
·
21h
·
Discuss:
Substack
🌪️
Chaos Engineering
The Power of Proof: Turning
CMMC
Compliance into Competitive
Credibility
semiengineering.com
·
2d
🌪️
Chaos Engineering
Is Claude
Opus
4.6 the Best Security
Researcher
Ever?
devops.com
·
1d
🔍
Static Analysis
The Security
Gap
in MCP: The Hidden Risks No One Is
Talking
About
memgraph.com
·
15h
·
Discuss:
Hacker News
🚀
MLOps
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
1d
·
Discuss:
Hacker News
,
r/programming
🔓
Binary Exploitation
Michael
Tsai
- Blog - LLMs and Software Development
Roundup
mjtsai.com
·
15h
🤖
AI Coding Tools
The Future of Systems
novlabs.ai
·
2h
·
Discuss:
Hacker News
🏗️
System Design
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
1d
·
Discuss:
Substack
🔍
Borrow Checker
Your AI Agent Will
Betray
You (Unless You Build It These
Guardrails
)
dev.to
·
1h
·
Discuss:
DEV
🤖
AI agents
Vibecoding
Audit
erik.wiffin.com
·
2d
·
Discuss:
Hacker News
✨
vibe-coding
Issues with AI:
Toxic
Dependencies
blog.mathieui.net
·
19h
·
Discuss:
Hacker News
🤖
AI Coding Tools
Top
Authentication
Techniques
to Build Secure Applications
blog.bytebytego.com
·
1d
🔐
Decentralized Identity
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔓
Binary Exploitation
Trust-Centered Digital Products Through Secure Design — Lessons Informed by Suzanne
Alipourian-Frascogna
future.forem.com
·
1d
·
Discuss:
DEV
🛡️
Privacy Engineering
A/B test yourself vs code agent |
Artur
Kęsik
arturkesik.com
·
1d
·
Discuss:
Hacker News
🤖
AI Coding Tools
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help