Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Computer Security
Threat Modeling, Vulnerability Analysis, Secure Coding, Encryption
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184191
posts in
30.7
ms
How to Apply
STRIDE
Threat Modeling and
SonarQube
Analysis for Secure Software Development
🦕
Deno
freecodecamp.org
·
2d
Ransomware is getting
uglier
as
cybercriminals
fake leaks and skip encryption entirely
🔧
Hardware Hacking
nerds.xyz
·
3d
·
r/Malware
SMSI
: System Model Security Inference: Automated Threat
Modeling
for Cyber-Physical Systems
🏠
Self-hosted AI
arxiv.org
·
2d
RSME
: A Reactive Stability
Mutation
Encryption Algorithm for Active Defense and Lightweight Cybersecurity
🔢
Homomorphic Encryption
zenodo.org
·
4d
·
Hacker News
,
Hacker News
Article:
CodeGuardian
: A Model Context Protocol Server for AI-Assisted Code Quality Analysis and Security
Scanning
🔍
Static Analysis
infoq.com
·
2d
VECT
: Ransomware by design,
Wiper
by accident
🔓
Binary Exploitation
malware.news
·
2d
Hacking
Policy for the Public Good
🔧
Hardware Hacking
youtube.com
·
5d
The Post-Quantum Security
Timeline
for Java:
JEP
496,
JEP
527, and What Teams Should Do Now
🗺️
eBPF Maps
javacodegeeks.com
·
2d
The FBI Says
Warrant-Proof
Encryption
Is A Public Safety Problem - Here's What It Means
🔐
Cryptography
slashgear.com
·
3d
VECT
2.0 Ransomware
Irreversibly
Destroys Files Over 131KB on Windows, Linux, ESXi
🔓
Binary Exploitation
thehackernews.com
·
2d
Quantum-Resilient
Cryptography
in the
openSUSE
Ecosystem
🔢
Homomorphic Encryption
news.opensuse.org
·
2d
From
Rerandtopia
to
Interceptopia
, the Anamorphic Encryption Saga Rises
🔢
Homomorphic Encryption
eprint.iacr.org
·
5d
Dormant
Digital
Assets
🔐
Cryptography
blog.dshr.org
·
2d
·
Blogger
CKKS
—
Polynomials
, the Canonical Embedding, and Encoding
🔢
Homomorphic Encryption
jeremykun.com
·
1d
·
Hacker News
Data Protection on AWS: Building an End-to-End Encryption Strategy for S3,
RDS
, and
Lambda
🔢
Homomorphic Encryption
medium.com
·
3d
eidolmor/hacker-terminal-game
: A terminal-based cybersecurity training game built in Python
🎮
Godot
github.com
·
6d
·
DEV
Alterion-Software/alterion-encrypt
: A full end-to-end encryption pipeline for Actix-web —
X25519
ECDH key exchange, AES-256-GCM session encryption, Argon2id password hashing, and a MessagePack + Deflate request/response pipeline, all behind a single middleware.
🛡️
Authenticated Encryption
github.com
·
4d
·
r/rust
Core Logic and
Algorithmic
Performance
Enhancements
for a System Vulnerability Analysis Technique for Complex Mission Critical Systems Implementation
⚙️
Alloy
arxiv.org
·
2d
Training Machine Learning Models on
Encrypted
Data: A Privacy-Preserving Framework using
Homomorphic
Encryption
🔢
Homomorphic Encryption
arxiv.org
·
2d
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🔧
Hardware Hacking
arxiv.org
·
2d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help