Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82986
posts in
472.9
ms
Loading...
Subscribe
Poison
Fountain
go.dev
·
1d
·
Discuss:
r/golang
💥
Cyberattack
I
Followed
the Password Reset Flow — and Ended Up
Resetting
Everyone’s Password
infosecwriteups.com
·
3d
💥
Cyberattack
The P in
PGP
isn’t for pain:
encrypting
emails in the browser
ckardaris.github.io
·
1d
·
Discuss:
Hacker News
💥
Cyberattack
Opinion: We need to
regulate
automated license
plate
readers now
thestranger.com
·
2d
🦹
cybercrime
Gartner
:
Tighten
Up AI Governance or Face the Consequences
tech.co
·
2d
🔍
Cyber threat intelligence
OT
attacks surge as threat actors embrace cloud and AI, warns
Forescout
itsecurityguru.org
·
3d
🔍
Cyber threat intelligence
Dutch
seniors
remain primary targets in 13,000 fake police
scams
in 2025
nltimes.nl
·
1d
🦹
cybercrime
How does
cyberthreat
attribution
help in practice?
kaspersky.com
·
5d
🦹
cybercrime
MoltBook
Is A Warning
bigtechnology.com
·
1d
🦹
cybercrime
The
Incognito
Mode
Lie
dev.to
·
2d
·
Discuss:
DEV
🦹
cybercrime
The blind spot every
CISO
must see:
Loyalty
csoonline.com
·
1d
🦹
cybercrime
Idempotency
and Circuit
Breakers
in n8n: A Production Survival Guide
dev.to
·
1d
·
Discuss:
DEV
💥
Cyberattack
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Substack
data
breach
confirmed: user phone numbers email addresses all stolen in attack, here's what we know
techradar.com
·
1d
💥
Cyberattack
New APT group
breached
gov and critical infrastructure
orgs
in 37 countries
csoonline.com
·
2d
💥
Cyberattack
AI-Driven Attacks
Enable
Rapid AWS Account
Takeovers
cyberpress.org
·
2d
💥
Cyberattack
Chinese
APT
Group Uses Linux Exploits To
Redirect
Traffic and Deploy Malicious Software
cyberpress.org
·
1d
💥
Cyberattack
Security researcher says AMD
auto-updater
downloads software
insecurely
, enabling remote code execution — company rep reportedly said man-in-the-middle attacks are "out of scope," ignored bug
tomshardware.com
·
17h
💥
Cyberattack
i built a "
stateless
" data vault (180 lines of code)
disguised
as a fishing log. had 41 clones yesterday!
github.com
·
2d
·
Discuss:
r/SideProject
💥
Cyberattack
This
Substack
Data Breach May Have
Compromised
Nearly 700,000 User Records
lifehacker.com
·
1d
💥
Cyberattack
Full Disclosure: SEC
Consult
SA-20260202-0 :: Multiple vulnerabilities in Native
Instruments
Native Access (MacOS)
seclists.org
·
3d
💥
Cyberattack
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help