Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81128
posts in
401.1
ms
Loading...
Subscribe
Socure
Unveils Unified Risk Platform for Government
Agencies
pymnts.com
·
5d
🔍
Cyber threat intelligence
EU’s latest Cybersecurity package: What
UAE-based
organisations
should know
consultancy-me.com
·
6d
🔍
Cyber threat intelligence
Live: How Bad
Laws
Get Made
m.scoop.co.nz
·
6d
🦹
cybercrime
The
Scam
Ad Machine
gendigital.com
·
5d
🦹
cybercrime
Critical flaws in
Ivanti
EPMM
lead to fast-moving exploitation attempts
cybersecuritydive.com
·
5d
💥
Cyberattack
Clawdbot
's Missing
Layers
robdodson.me
·
6d
·
Discuss:
Hacker News
🦹
cybercrime
Tutorial
on Reasoning for
IR
&
IR
for Reasoning
arxiv.org
·
5d
🔍
Cyber threat intelligence
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
Secure
AI infrastructure: call for information
gov.uk
·
6d
·
Discuss:
Hacker News
🔍
Cyber threat intelligence
‘Digital
desecrations
’: when
deepfakes
are used to mock tragic deaths and what platforms should do about it
indicator.media
·
5d
🦹
cybercrime
Evaluating
False
Alarm and Missing Attacks in CAN
IDS
arxiv.org
·
5d
💥
Cyberattack
Show HN:
Kekkai
– Interactive security
triage
in the terminal
news.ycombinator.com
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Multi-layer defense for LLM agents inspired by
immune
systems (seeking
critique
)
gist.github.com
·
4d
·
Discuss:
Hacker News
💥
Cyberattack
I made my own encrypted
tunnels
with
NodePass
because I don't trust Cloudflare
xda-developers.com
·
5d
💥
Cyberattack
AT&T
breach
data
resurfaces
with new risks for customers
malwarebytes.com
·
5d
💥
Cyberattack
Notepad
++
Hijacked
by Chinese Hackers for Six Months
security.land
·
6d
·
Discuss:
r/privacy
💥
Cyberattack
Apple users are being targeted by a
coordinated
Apple Pay
phishing
campaign
appleinsider.com
·
5d
💥
Cyberattack
Leveraging Python and Open Source Tools to Bypass
Gated
Content Safely and
Ethically
dev.to
·
5d
·
Discuss:
DEV
💥
Cyberattack
Overcoming
IP Bans During Web Scraping in Legacy Python
Codebases
dev.to
·
5d
·
Discuss:
DEV
💥
Cyberattack
The Architecture of Trust:
Guardrails
for Production Generative AI Applications and the
Llama
…
pub.towardsai.net
·
5d
💥
Cyberattack
When AI Codes for
Hackers
: The 25-Minute
Ransomware
Reality
smarterarticles.co.uk
·
6d
🔍
Cyber threat intelligence
Loading...
Loading more...
« Page 44
•
Page 46 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help