Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
10200
posts in
128.7
ms
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
1d
·
Discuss:
Hacker News
🔓
Binary Exploitation
Advancing
the C language in today’s time means
improving
safety,
dev.to
·
4h
·
Discuss:
DEV
🔌
Embedded Rust
The New
Stem
blog.gorewood.games
·
1h
💻
Creative Coding
SynAT
: Enhancing Security Knowledge Bases via Automatic
Synthesizing
Attack Tree from Crowd Discussions
arxiv.org
·
1d
🕸️
Knowledge Graphs
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
·
2h
🏗️
System Design
AI Is
Stress-Testing
Software Engineering as a
Profession
learningloom.substack.com
·
1d
·
Discuss:
Substack
🌪️
Chaos Engineering
The Power of Proof: Turning
CMMC
Compliance into Competitive
Credibility
semiengineering.com
·
2d
🌪️
Chaos Engineering
Securing
GenAI: Vol. 8 — Deploying AI apps
securely
pub.towardsai.net
·
14h
🤖
AI Coding Tools
Is Claude
Opus
4.6 the Best Security
Researcher
Ever?
devops.com
·
1d
🔍
Static Analysis
A
Horrible
Conclusion
addisoncrump.info
·
3h
·
Discuss:
Lobsters
,
Hacker News
🔓
Binary Exploitation
The Security
Gap
in MCP: The Hidden Risks No One Is
Talking
About
memgraph.com
·
20h
·
Discuss:
Hacker News
🚀
MLOps
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
1d
·
Discuss:
Hacker News
,
r/programming
🔓
Binary Exploitation
The Future of Systems
novlabs.ai
·
6h
·
Discuss:
Hacker News
🏗️
System Design
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work – A Practical Guide from an IT
Technician
dev.to
·
3d
·
Discuss:
DEV
🌐
Network Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
1d
·
Discuss:
Substack
🔍
Borrow Checker
OSTEP
Chapters
6,7
muratbuffalo.blogspot.com
·
2d
·
Discuss:
Blogger
🏗
Computer Architecture
Michael
Tsai
- Blog - LLMs and Software Development
Roundup
mjtsai.com
·
19h
🤖
AI Coding Tools
A/B test yourself vs code agent |
Artur
Kęsik
arturkesik.com
·
1d
·
Discuss:
Hacker News
🤖
AI Coding Tools
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🔓
Binary Exploitation
Going Through
Snowden
Documents
, Part 5
libroot.org
·
9h
·
Discuss:
Hacker News
🛡️
Privacy Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help