Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81859
posts in
1.04
s
Loading...
Subscribe
College
freshman
charged in alleged murder-for-hire plot against
classmate
local12.com
·
5d
🦹
cybercrime
Shostack
+ Associates >
Shostack
+ Friends Blog >
Bitlocker
, the FBI, and Risk
shostack.org
·
5d
🦹
cybercrime
PDF phishing attack leads to stolen
Dropbox
credentials
scworld.com
·
6d
·
Discuss:
Hacker News
💥
Cyberattack
So
yeah
, I vibe-coded a log
colorizer
—and I feel good about it
arstechnica.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
💥
Cyberattack
Properly
securing
OpenClaw
with authentication
haproxy.com
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Hostile
(
Corporate
) Architecture
thevinter.com
·
5d
·
Discuss:
Hacker News
🦹
cybercrime
Surveillance
Secrets
lighthousereports.com
·
5d
🦹
cybercrime
The Gaps That Created the New Wave of
SIEM
and AI SOC Vendors – Future of Tech and Security: Strategy & Innovation with
Raffy
raffy.ch
·
5d
🔍
Cyber threat intelligence
Show HN:
Stanislavski
Protocol – Real-Time Emotional
Logic
Framework
news.ycombinator.com
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Certain brain injuries may be linked to violent crime –
identifying
them could help reveal how people make moral
choices
theconversation.com
·
5d
🦹
cybercrime
Infosecurity
Europe launches
cyber
security startups stream
computerweekly.com
·
5d
🦹
cybercrime
ICYMI
: Experts on Experts
rapid7.com
·
5d
🔍
Cyber threat intelligence
ShinyHunters-Branded
Extortion
Activity Expands, Escalates
securityweek.com
·
6d
🦹
cybercrime
Chaos in
Minneapolis
Exposes
an Internet at War With Truth
nytimes.com
·
5d
🦹
cybercrime
SHOW HN:
Notepad
++ Vulnerability
Checker
github.com
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Stop
Hashing
Passwords: A Practical Step-by-Step
Passkey
Tutorial
dev.to
·
6d
·
Discuss:
DEV
💥
Cyberattack
Leveraging Python to Detect
Phishing
Patterns in Legacy
Codebases
for DevOps Success
dev.to
·
4d
·
Discuss:
DEV
🔍
Cyber threat intelligence
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
APT28
Uses Microsoft Office CVE-2026-21509 in
Espionage-Focused
Malware Attacks
thehackernews.com
·
5d
💥
Cyberattack
3Dassets.one
,
Vivaldi
, Firefox, More: Wednesday ResearchBuzz, February 4, 2026
researchbuzz.me
·
4d
🦹
cybercrime
InfoSec News Nuggets 02/02/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
6d
🔍
Cyber threat intelligence
Loading...
Loading more...
« Page 41
•
Page 43 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help