Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81157
posts in
933.8
ms
Loading...
Subscribe
Joseph
Gordon-Levitt
slams Big Tech for
sextortion
, threats to children while calling for key internet reform
wfmd.com
·
4d
🦹
cybercrime
A case study in PDF
forensics
: The Epstein
PDFs
pdfa.org
·
4d
·
Discuss:
Hacker News
🦹
cybercrime
How Data
Brokers
Can Fuel Violence Against Public
Servants
wired.com
·
5d
·
Discuss:
Hacker News
🦹
cybercrime
Inside the AI
surveillance
state
wbur.org
·
5d
🦹
cybercrime
Cyber Insurance,
Audit
, and Policy: Review, Analysis and
Recommendations
arxiv.org
·
5d
🦹
cybercrime
Toxic Tuesday - the day the war of words around social media and AI regulation between the US and Europe hit a new low - as Musk
screams
victimisation
on X!
diginomica.com
·
4d
🦹
cybercrime
Paris prosecutor’s
cybercrime
unit searches social media network X’s offices; Elon Musk
summoned
straitstimes.com
·
5d
🦹
cybercrime
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Notepad
++
hijacked
by suspected state-sponsored hackers
therecord.media
·
6d
💥
Cyberattack
What Is Cyber
Incident
Response and Why It
Matters
securityscorecard.com
·
5d
🔍
Cyber threat intelligence
Nitrogen
ransomware is so broken even the
crooks
can't unlock your files
theregister.com
·
4d
·
Discuss:
Hacker News
🦹
cybercrime
French headquarters of Elon Musk’s X
raided
by Paris
cybercrime
unit
theguardian.com
·
5d
·
Discuss:
Hacker News
🦹
cybercrime
What Is an Advanced
Persistent
Threat
securityscorecard.com
·
5d
🔍
Cyber threat intelligence
Understanding Cybersecurity in a
Digitally
Connected
World
dev.to
·
6d
·
Discuss:
DEV
🦹
cybercrime
How
criminals
are using AI to clone victims’ voices and set up direct
debits
the-independent.com
·
4d
🦹
cybercrime
The Day My Linux Server Started
Distributing
Windows
Malware
dev.to
·
5d
·
Discuss:
DEV
🦹
cybercrime
Notepad
++ hit by suspected Chinese
state-sponsored
hackers - here's what we know so far
techradar.com
·
5d
🦹
cybercrime
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
5d
🦹
cybercrime
Full Disclosure: [
KIS-2026-01
]
Blesta
<= 5.13.1 (confirm_url) Reflected Cross-Site Scripting Vulnerability
seclists.org
·
4d
💥
Cyberattack
ICE Is
Watching
You
nytimes.com
·
5d
🦹
cybercrime
Islanders’ Bo
Horvat
startled
by bird on the ice: ‘Ran into him behind the net, poor guy’
nytimes.com
·
4d
💥
Cyberattack
Loading...
Loading more...
« Page 34
•
Page 36 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help