Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83035
posts in
814.7
ms
Loading...
Subscribe
RPG:
DCC
Goes Cyberpunk In '
Netcrawl
RPG'
google.com
·
1d
🦹
cybercrime
Listen:
Criminals
clone elderly victims’ voices with AI to set up direct
debits
independent.co.uk
·
1d
🦹
cybercrime
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
1d
🦹
cybercrime
AI and the
Reconfiguration
of the
Counterintelligence
Battlefield
tandfonline.com
·
2d
🔍
Cyber threat intelligence
SNAP! System
Reference
Document
legacy.drivethrurpg.com
·
1d
🦹
cybercrime
Access
Denied
vans.com
·
4d
💥
Cyberattack
Beyond
Roleplay
:
Jailbreaking
Gemini with drugs and ritual
tidepool.leaflet.pub
·
1d
·
Discuss:
Hacker News
💥
Cyberattack
Sanctioned
Bulletproof
Host Linked to
Hijacking
of Old Home Routers
hackread.com
·
1d
🦹
cybercrime
AI, defense tech and
cyber
: How safe is the future of
dual-use
defense- opinion
jpost.com
·
2d
🔍
Cyber threat intelligence
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
2d
🦹
cybercrime
MCP in
Burp
Suite: From
Enumeration
to Targeted Exploitation
dev.to
·
1d
·
Discuss:
DEV
🔍
Cyber threat intelligence
Cisco,
F5
Patch
High-Severity
Vulnerabilities
securityweek.com
·
1d
💥
Cyberattack
Apple's '
Lockdown
Mode' Could Stop the Government From Breaking Into Your iPhone
lifehacker.com
·
1d
💥
Cyberattack
**Abstract:** This paper introduces a novel system for enhancing e-commerce businesses through automated
anomaly
detection and predictive
behavioral
analysis...
freederia.com
·
2d
🔍
Cyber threat intelligence
Understanding AI Security
databricks.com
·
4d
🔍
Cyber threat intelligence
Florida AG James
Uthmeier
launches China unit targeting
scams
, data abuse
wpbf.com
·
1d
🦹
cybercrime
AI Will Not Save Cybersecurity: Why the Arms Race
Favors
Attackers
smarterarticles.co.uk
·
3d
🔍
Cyber threat intelligence
Detecting
Phishing
Patterns with Python: Open Source Strategies for Security Researchers
dev.to
·
2d
·
Discuss:
DEV
💥
Cyberattack
Newsletter platform
Substack
notifies
users of data breach
bleepingcomputer.com
·
1d
·
Discuss:
r/technews
🦹
cybercrime
**Abstract:** This paper proposes a novel framework,
HyperScore-Enabled
Autonomous Anomaly Mitigation (
HEAM
), for real-time anomaly detection and mitigation ...
freederia.com
·
1d
🔍
Cyber threat intelligence
Loading...
Loading more...
« Page 18
•
Page 20 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help