Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Cryptography, Vulnerabilities, Secure Coding, Authentication
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
121497
posts in
1.22
s
The Hidden Risks in Modern
Applications
and How to
Protect
Against Them
theaisurf.com
·
1d
🧪
Testing
Security and So Many Things
asecuritysite.com
·
3d
·
Discuss:
Hacker News
🧪
Testing
RFC 4262: X.509 Certificate Extension for
Secure/Multipurpose
Internet Mail Extensions (
S/MIME
) Capabilities
rfc-editor.org
·
13h
🔌
APIs
Vulnerabilities in 45 Open Source Projects (vLLM,
Langfuse
, Phase,
NocoDB
)
kolega.dev
·
18h
·
Discuss:
Hacker News
🌐
WebAssembly
KeyleSSH
: A New PAM Concept for IT
Admins
dev.to
·
6h
·
Discuss:
DEV
⚡
Systems Programming
SAST vs DAST vs (
IAST/RASP
): Quick AppSec Checklist
codereviewlab.com
·
1d
·
Discuss:
DEV
🌐
WebAssembly
EU Commission Breach – The
Importance
of
Upholding
Strong Device Management Infrastructure
itsecurityguru.org
·
18h
⚡
Systems Programming
Hackers are
shifting
from
mega-breaches
to small, hard-to-detect attacks
ketv.com
·
11h
🧪
Testing
Authentication in 2026 - moving beyond
foundational
MFA
to tackle the new era of attacks
techradar.com
·
1d
🧪
Testing
Handling
HIPAA
: A Developer’s First Steps
spin.atomicobject.com
·
19h
🔌
APIs
CodeSOD
:
Cover
Up
thedailywtf.com
·
1d
🌐
WebAssembly
Can you trust
LastPass
in 2026? Inside the
multimillion-dollar
quest to rebuild its security culture
zdnet.com
·
16h
·
Discuss:
Hacker News
🧪
Testing
Hackable
Software
blog.abdellatif.io
·
1d
·
Discuss:
Hacker News
💻
CLI Tools
Keeper Security Achieves
GovRAMP
High Authorization, Enabling
SLED
Organizations to Secure Their Most Sensitive Systems and Data
prnewswire.com
·
16h
🔌
APIs
Kidnapped: An
OSINT
CTF by
HACKTORIA
medium.com
·
6h
💻
CLI Tools
The
Secure
Force: Building an End-to-End
SDLC
Without Breaking the Bank
hackernoon.com
·
1d
⚡
Systems Programming
Demystifying JOSE, the JWT Family: JWS, JWE,
JWA
, and
JWK
Explained
auth0.com
·
5h
🌐
WebAssembly
Nation-State Actors
Exploit
Notepad
++ Supply Chain
unit42.paloaltonetworks.com
·
9h
⚡
Systems Programming
Building a Virtual
Ethical
Hacking Home Lab — Part 6: System
Exploitation
infosecwriteups.com
·
2h
⚡
Systems Programming
Maintaining
Skills During the AI
Advent
saadnaveed.com
·
8h
·
Discuss:
Hacker News
⚡
Systems Programming
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help