Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Security
Cryptography, Vulnerabilities, Secure Coding, Authentication
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
115759
posts in
2.80
s
privacy
professionals
:
discord
blog.avas.space
·
2d
🧪
Testing
Domain
Security Report: Are Global 2000 Companies Doing
Enough
on
Domain
Security?
circleid.com
·
1d
🔌
APIs
Investigation on the
EmEditor
Supply Chain
Cyberattack
stormshield.com
·
1d
🔌
APIs
What Does The
Sonatype
2026 State of the Software Supply
Chain
Report Reveal?
i-programmer.info
·
1d
·
Discuss:
Hacker News
,
r/devops
,
r/programming
⚡
Systems Programming
Most quantum computer scientists are
complicit
hackers
shashvatshukla.com
·
1d
⚡
Systems Programming
Strengthening
Windows trust and security through User Transparency and
Consent
blogs.windows.com
·
1d
·
Discuss:
Hacker News
⚡
Systems Programming
EU, Dutch government announce
hacks
following
Ivanti
zero-days
therecord.media
·
1d
🔌
APIs
The Verification Theater: When Formal Methods Create False
Assurance
in
Cryptographic
Libraries
eprint.iacr.org
·
5d
🎹
Analog Synthesizers
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
2d
·
Discuss:
Hacker News
⚡
Systems Programming
🦞 What People Are Actually Doing With
OpenClaw
: 25+ Use
Cases
forwardfuture.ai
·
1d
🌐
WebAssembly
Code has _
always
_ been the easy part
laughingmeme.org
·
1d
·
Discuss:
Hacker News
🌐
WebAssembly
Ethereum Signature Schemes Explained: ECDSA, BLS,
XMSS
, and Post-Quantum
leanSig
with Rust Code Examples
blog.lambdaclass.com
·
1d
📊
Data Structures
The
Joy
of
Programming
deanclatworthy.com
·
1d
·
Discuss:
Hacker News
⚡
Systems Programming
AI giants are
racing
to secure
shrinking
memory. It’s creating opportunities for startups
sifted.eu
·
1d
⚡
Systems Programming
Hope Is Not a Security Strategy: Why
Secure-by-Default
Beats
Hardening
tuananh.net
·
2d
⚡
Systems Programming
Securing
GenAI
: Vol 4 — Fundamentals of AI model security
pub.towardsai.net
·
1d
🧪
Testing
Code
Reviews
: Here's What They Actually
Teach
Us
hackernoon.com
·
1d
🌐
WebAssembly
JavaScript Data
Types
: A Friendly Guide for
Beginners
🚀
dev.to
·
3h
·
Discuss:
DEV
🌐
WebAssembly
Evasion
of IoT Malware Detection via
Dummy
Code Injection
arxiv.org
·
1d
🎹
Analog Synthesizers
Never settle: How
CISOs
can go beyond compliance standards to better protect their
organizations
csoonline.com
·
1d
🧪
Testing
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help