Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security
Cryptography, Vulnerabilities, Secure Coding, Authentication
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82106
posts in
224.0
ms
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
ยท
14h
๐น
Analog Synthesizers
Main
Content ||
Math
โฉ Programming
jeremykun.com
ยท
1h
๐
Data Structures
Beyond
Login
Screens
: Why Access Control Matters
blog.sucuri.net
ยท
1d
โก
Systems Programming
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
ยท
1d
๐งช
Testing
privacy
professionals
: working at a
messaging/social
media platform
blog.avas.space
ยท
6h
๐๏ธ
Databases
hanig/engram
: Personal knowledge graph and automation system
github.com
ยท
22h
๐
APIs
Home
eventhorizonarchitecture.org
ยท
3h
๐
Concurrency
The
Convergence
of Risk: 2026
Cybersecurity
Outlook
dev.to
ยท
1d
ยท
Discuss:
DEV
โก
Systems Programming
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
ยท
4h
ยท
Discuss:
Hacker News
โก
Systems Programming
Data protection in the age of artificial intelligence: why
transparency
, control, and
humanity
are now crucial
igorslab.de
ยท
18h
โก
Systems Programming
I've
abandoned
third-party
antivirus
and I'm never looking back
howtogeek.com
ยท
1d
โก
Systems Programming
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
ยท
18h
ยท
Discuss:
Hacker News
โก
Systems Programming
security center at university of Washington
secure-center.org
ยท
18h
๐ป
CLI Tools
A New Era for Security? Anthropic's Claude
Opus
4.6 Found 500
High-Severity
Vulnerabilities
it.slashdot.org
ยท
21h
๐
APIs
Code only says what it does
brooker.co.za
ยท
21h
ยท
Discuss:
Hacker News
๐
WebAssembly
Software supply
chain
risks join the
OWASP
top 10 list, access control still on top
csoonline.com
ยท
3d
๐
WebAssembly
CySecurity
News - Latest Information Security and Hacking
Incidents
: A New Twist on Old Cyber Tricks
cysecurity.news
ยท
5h
ยท
Discuss:
Blogger
โก
Systems Programming
Sony
Ericsson
Course
Material
(2012)
systemicsoftwaredebugging.com
ยท
2h
ยท
Discuss:
Hacker News
โก
Systems Programming
INTERNATIONAL EDITION
securityaffairs.com
ยท
10h
๐งช
Testing
How network
modernization
enables AI success and quantum
readiness
techradar.com
ยท
13h
๐
APIs
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help