Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81136
posts in
569.1
ms
Loading...
Subscribe
The Port 19
Chargen
Amplification
Attack on Financial Institutions (2013)
connected.app
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Show HN:
TalentLyt
– A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
·
3d
·
Discuss:
Hacker News
💥
Cyberattack
All
laws
are local
doctorow.medium.com
·
3d
🦹
cybercrime
Expertise
is a
Relic
; They want Drones
bill-rider.com
·
3d
·
Discuss:
Hacker News
🦹
cybercrime
Client-Side
Encrypted
Posts in
Jekyll
joshbeckman.org
·
4d
·
Discuss:
Hacker News
💥
Cyberattack
Chrysalis
,
Notepad
++, and Supply Chain Risk: What it Means, and What to Do Next
rapid7.com
·
3d
🦹
cybercrime
Use ChatGPT to Flag Scams
Instantly
With
Malwarebytes
maketecheasier.com
·
3d
🦹
cybercrime
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Posts
aphyr.com
·
4d
💥
Cyberattack
Adblocking
≠
Piracy
manuelmoreale.com
·
3d
🦹
cybercrime
Researchers
Expose
Network of 150
Cloned
Law Firm Websites in AI-Powered Scam Campaign
securityweek.com
·
3d
🦹
cybercrime
The First 90
Seconds
: How Early Decisions Shape Incident Response
Investigations
thehackernews.com
·
4d
🦹
cybercrime
Polish cops bail 20-year-old
bedroom
botnet
operator
theregister.com
·
5d
🦹
cybercrime
SIEM
Rules for detecting exploitation of vulnerabilities in
FortiCloud
SSO
kaspersky.com
·
3d
💥
Cyberattack
Streamlining
Authentication
Flows
in Go with Open Source Tools
dev.to
·
4d
·
Discuss:
DEV
💥
Cyberattack
Microsoft warns
infostealer
malware is '
rapidly
expanding beyond traditional Windows-focused campaigns' and targeting Mac devices
techradar.com
·
4d
🦹
cybercrime
Devil Trigger (Devil May
Cry/Worm
AU)
forums.sufficientvelocity.com
·
4d
🦹
cybercrime
AI agents can't yet pull off fully autonomous cyberattacks - but they are already very
helpful
to
crims
theregister.com
·
5d
💥
Cyberattack
**Abstract:** The algorithmic
curation
of news and information by global tech companies
profoundly
impacts democratic discourse. This paper proposes a novel ...
freederia.com
·
3d
💥
Cyberattack
China-Linked
Amaranth-Dragon
Exploits
WinRAR
Flaw in Espionage Campaigns
thehackernews.com
·
4d
💥
Cyberattack
Notepad
++ infrastructure
hijacked
by Chinese APT in sophisticated supply chain attack
csoonline.com
·
5d
💥
Cyberattack
Loading...
Loading more...
« Page 29
•
Page 31 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help