Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
random_user's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82910
posts in
252.6
ms
Loading...
Subscribe
The P in
PGP
isn’t for pain:
encrypting
emails in the browser
ckardaris.github.io
·
1d
·
Discuss:
Hacker News
🛡
Cyber security
Resilience
Wins Cyber Insurance Awards Europe for
MGA
of the Year
prnewswire.com
·
1d
🛡
Cyber security
Explainer
:
XPC
eclecticlight.co
·
1d
🖥
System Administration
Using AI Agents to
Analyze
Malware on
REMnux
zeltser.com
·
1d
🖥
System Administration
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
2d
🛡
Cyber security
The Ball and Chain: Why
Git
is an
Anti-Pattern
for AI-Native Engineering
dev.to
·
21h
·
Discuss:
DEV
⚙
DevOps
I Built
DevDNA
— A Tool That Turns GitHub
Profiles
Into Developer Personality Reports (Using Copilot CLI)
dev.to
·
15h
·
Discuss:
DEV
⚙
DevOps
Show HN: API Unit manage and schedule real API test
flows
, not just
requests
apiunit.io
·
2d
·
Discuss:
Hacker News
⚙
DevOps
GTK
hackfest
, 2026 edition
blogs.gnome.org
·
1d
⚙
DevOps
Spec-Driven Design with
Kiro
: Lessons from
Seddle
medium.com
·
1d
·
Discuss:
Hacker News
⚙
DevOps
The
Sandbox
Explosion
daax.dev
·
1d
·
Discuss:
Hacker News
⚙
DevOps
SynAT
: Enhancing Security Knowledge Bases via Automatic
Synthesizing
Attack Tree from Crowd Discussions
arxiv.org
·
2d
🛡
Cyber security
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Your Home for Multi-Agent Development
code.visualstudio.com
·
2d
⚙
DevOps
The Shadow Campaigns:
Uncovering
Global
Espionage
lemmy.ml
·
1d
🛡
Cyber security
How
recruitment
fraud turned cloud
IAM
into a $2 billion attack surface
venturebeat.com
·
2d
🛡
Cyber security
Living off the AI: The Next Evolution of
Attacker
Tradecraft
securityweek.com
·
1d
🛡
Cyber security
I broke my Linux system on purpose and
recovered
it without
reinstalling
makeuseof.com
·
20h
🖥
System Administration
‘
DKnife
’ Implant Used by Chinese Threat Actor for
Adversary-in-the-Middle
Attacks
securityweek.com
·
2d
·
Discuss:
r/NowInCyber
🛡
Cyber security
CySecurity
News - Latest Information Security and Hacking Incidents: Spain’s Science Ministry
Partially
Shuts Online Systems After Suspected Cyber Incident
cysecurity.news
·
1d
·
Discuss:
Blogger
🛡
Cyber security
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
2d
🛡
Cyber security
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help