Skip to main content
Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ก๏ธ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Hot
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7686
posts in
146.5
ms
A
Cool
Take on
Cybersecurity
+ AI
dev.to
ยท
9h
ยท
Discuss:
DEV
๐ค
Cyberpunk
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
LLMs Under
Siege
: The Red Team
Reality
Check of 2026
eddieoz.com
ยท
9h
ยท
Discuss:
Hacker News
๐
MLOps
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
There's a secret computer inside your computer
xda-developers.com
ยท
8h
๐
eBPF
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
LLM Security and Safety: Insights from
Homotopy-Inspired
Prompt
Obfuscation
arxiv.org
ยท
46m
๐ข
Homomorphic Encryption
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Techniques
of Modern Attacks
arxiv.org
ยท
1d
๐
Network Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Work
srikanth.bearblog.dev
ยท
1d
๐
Job Queues
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Threat
Actors
Expand
Abuse
of Microsoft Visual Studio Code
jamf.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Binary Exploitation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Alice
and Bob in
Wonderland
- Identity and authority without servers (2024)
herbcaudill.com
ยท
23h
ยท
Discuss:
Hacker News
๐
Decentralized Identity
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
CySA
+ Log Analysis &
CVSS
Training Tool
cysa-exam-prep.web.app
ยท
2d
ยท
Discuss:
Hacker News
๐
Network Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
When Should
SMB
Data Teams Bring in Professional Security Expertise? (
Sponsored
)
bit.ly
ยท
2d
๐
Network Security
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
AI-supported vulnerability
triage
with the GitHub Security Lab
Taskflow
Agent
github.blog
ยท
1d
๐ค
AI Coding Tools
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Evolution
of LLMs use by a
programmer
asfaload.com
ยท
12h
ยท
Discuss:
Hacker News
๐ฌ
Language Servers
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
I built a Python project to
explore
practical
password
security
dev.to
ยท
1d
ยท
Discuss:
DEV
๐
Fuzzing
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Learning from Models
rodney.bearblog.dev
ยท
1d
๐ค
Reinforcement Learning
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Conversation
: LLMs and the what/how
loop
martinfowler.com
ยท
15h
๐ฆ
Rust Macros
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Show HN:
Autonoma
โ Air-Gapped AI Code Engineer (
L5
Autonomy)
vihaaninnovations.github.io
ยท
1d
ยท
Discuss:
Hacker News
๐ค
AI Coding Tools
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
MLSN
#18: Adversarial Diffusion, Activation
Oracles
, Weird Generalization
lesswrong.com
ยท
1d
๐
Self-hosted AI
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Kolmogorov
Complexity
en.wikipedia.org
ยท
17h
ยท
Discuss:
Hacker News
๐ฏ
Hindley-Milner
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Threat Research: Open-Source Python
Script
Drives Social Media
Phishing
Campaign
reliaquest.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Binary Exploitation
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
RISC-V
and Post-Quantum
Cryptography
fprox.substack.com
ยท
1d
ยท
Discuss:
Substack
๐
Cryptography
Preview
Share
Show Feeds
Block Domain
Report Post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Wrong Language
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help