Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81887
posts in
721.5
ms
Loading...
Subscribe
Ramen
shop manager arrested for punching self in the face and
pretending
he was robbed
soranews24.com
·
2d
🦹
cybercrime
Poison
Fountain
go.dev
·
2d
·
Discuss:
r/golang
💥
Cyberattack
VLAN
’s and
Subnets
For Home Networks
pragmaticcoding.ca
·
2d
🦹
cybercrime
Opinion: We need to
regulate
automated license
plate
readers now
thestranger.com
·
3d
🦹
cybercrime
The
Kitchen
Sink
Engineer
blog.gorewood.games
·
2d
🦹
cybercrime
From Log Aggregation to Threat Hunting:
Maximizing
Your
SIEM
Investment
latesthackingnews.com
·
2d
🔍
Cyber threat intelligence
OT
attacks surge as threat actors embrace cloud and AI, warns
Forescout
itsecurityguru.org
·
4d
🔍
Cyber threat intelligence
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
·
2d
·
Discuss:
Hacker News
💥
Cyberattack
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
3d
🔍
Cyber threat intelligence
Clouding
the Mirror:
Stealthy
Prompt Injection Attacks Targeting LLM-based Phishing Detection
arxiv.org
·
2d
💥
Cyberattack
Deep Learning for
Contextualized
NetFlow-Based
Network Intrusion Detection: Methods, Data, Evaluation and Deployment
arxiv.org
·
2d
🔍
Cyber threat intelligence
How
recruitment
fraud turned cloud
IAM
into a $2 billion attack surface
venturebeat.com
·
3d
💥
Cyberattack
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
CAP-SRP
: Building a Cryptographic Flight Recorder for AI Content
Refusals
— A Complete Implementation Guide
dev.to
·
2d
·
Discuss:
DEV
💥
Cyberattack
The
Intent-Verification
Gap in CI/CD: Why
Authentication
Fails Under Real Attacks
dev.to
·
1d
·
Discuss:
DEV
💥
Cyberattack
privacy
professionals
: working at a
messaging/social
media platform
blog.avas.space
·
10h
🦹
cybercrime
OSINT-How
Public Information
Becomes
Powerful Intelligence
medium.com
·
2d
🔍
Cyber threat intelligence
Substack
Discloses
Security Incident After Hacker Leaks Data
securityweek.com
·
3d
💥
Cyberattack
Digital
Footprint
medium.com
·
1d
🦹
cybercrime
February 5,2026
buttondown.com
·
3d
🦹
cybercrime
Weaning
off
GreedCorp
™: Building a user-owned future for computing
goodinternetmagazine.com
·
2d
🦹
cybercrime
Loading...
Loading more...
« Page 15
•
Page 17 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help