Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
82993
posts in
1.13
s
Loading...
Subscribe
Incognito
Market admin sentenced to 30 years for running $105 million dark web drug
empire
bitdefender.com
·
1d
🦹
cybercrime
Normal
Distributions
and other Killing Machines (a post about
systemic
violence)
angrybunnyman.com
·
2d
🦹
cybercrime
SNAP! System
Reference
Document
legacy.drivethrurpg.com
·
2d
🦹
cybercrime
Wirth
's
Revenge
jmoiron.net
·
3d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🦹
cybercrime
Sanctioned
Bulletproof
Host Linked to
Hijacking
of Old Home Routers
hackread.com
·
2d
🦹
cybercrime
AI Command and Staff–
Operational
Evidence and Insights from
Wargaming
militarystrategymagazine.com
·
2d
·
Discuss:
Hacker News
🔍
Cyber threat intelligence
Let AI agents read your accounts, but
approve
writes
first
monteslu.com
·
2d
·
Discuss:
Hacker News
💥
Cyberattack
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
2d
🦹
cybercrime
How to
bake
cyber
resilience
into your startup culture
mitsloan.mit.edu
·
3d
🦹
cybercrime
Feb
. 5, 2026
blog.ctms.me
·
2d
🦹
cybercrime
AI, defense tech and
cyber
: How safe is the future of
dual-use
defense- opinion
jpost.com
·
3d
🔍
Cyber threat intelligence
AI vs
Hackers
: How Artificial Intelligence Is
Reshaping
Modern Cybersecurity Services
dev.to
·
3d
·
Discuss:
DEV
🔍
Cyber threat intelligence
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
## Automated Anomaly Detection and
Attribution
in Critical Infrastructure
SCADA
Systems Utilizing a Hybrid Bayesian Network and Graph Neural Network Architecture
freederia.com
·
1d
🔍
Cyber threat intelligence
Three clues that your LLM may be
poisoned
with a
sleeper-agent
back door
theregister.com
·
2d
🔍
Cyber threat intelligence
Surajkumar5050/zyron-assistant
: ⚡ A local, privacy-focused AI desktop assistant for Windows. Control your PC remotely via Telegram or locally with Voice commands. Powered by Ollama.
github.com
·
1d
·
Discuss:
Hacker News
,
r/linux
💥
Cyberattack
Full Disclosure: [
KIS-2026-02
]
Blesta
<= 5.13.1 (Admin Interface) Multiple PHP Object Injection Vulnerabilities
seclists.org
·
2d
💥
Cyberattack
Substack
data breach
leaks
users’ email addresses and phone numbers
csoonline.com
·
1d
·
Discuss:
Hacker News
💥
Cyberattack
**Title: Dynamic
Attribution
Modeling for Cross-Border Cyber Incident Response Coordination via Bayesian Network Optimization** **Abstract:** This paper
intr
...
freederia.com
·
2d
🔍
Cyber threat intelligence
Op
Neusploit
: Russian
APT28
Uses Microsoft Office Flaw in Malware Attacks
hackread.com
·
3d
💥
Cyberattack
Broken
Phishing
URLs
, (Thu, Feb 5th)
isc.sans.edu
·
2d
💥
Cyberattack
Loading...
Loading more...
« Page 20
•
Page 22 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help