Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
youbecks's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81439
posts in
407.0
ms
Loading...
Subscribe
EU’s latest Cybersecurity package: What
UAE-based
organisations
should know
consultancy-me.com
·
6d
🔍
Cyber threat intelligence
Live: How Bad
Laws
Get Made
m.scoop.co.nz
·
6d
🦹
cybercrime
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
The
Scam
Ad Machine
gendigital.com
·
6d
🦹
cybercrime
Clawdbot
's Missing
Layers
robdodson.me
·
6d
·
Discuss:
Hacker News
🦹
cybercrime
‘Digital
desecrations
’: when
deepfakes
are used to mock tragic deaths and what platforms should do about it
indicator.media
·
5d
🦹
cybercrime
Critical flaws in
Ivanti
EPMM
lead to fast-moving exploitation attempts
cybersecuritydive.com
·
6d
💥
Cyberattack
Evaluating
False
Alarm and Missing Attacks in CAN
IDS
arxiv.org
·
5d
💥
Cyberattack
Show HN:
Kekkai
– Interactive security
triage
in the terminal
news.ycombinator.com
·
6d
·
Discuss:
Hacker News
💥
Cyberattack
Multi-layer defense for LLM agents inspired by
immune
systems (seeking
critique
)
gist.github.com
·
5d
·
Discuss:
Hacker News
💥
Cyberattack
Socure
Unveils Unified Risk Platform for Government
Agencies
pymnts.com
·
5d
🔍
Cyber threat intelligence
AT&T
breach
data
resurfaces
with new risks for customers
malwarebytes.com
·
6d
💥
Cyberattack
I made my own encrypted
tunnels
with
NodePass
because I don't trust Cloudflare
xda-developers.com
·
6d
💥
Cyberattack
Tutorial
on Reasoning for
IR
&
IR
for Reasoning
arxiv.org
·
5d
🔍
Cyber threat intelligence
Apple users are being targeted by a
coordinated
Apple Pay
phishing
campaign
appleinsider.com
·
6d
💥
Cyberattack
Evasion
Tactics for IP Banning During Web
Scraping
with Python on a Zero Budget
dev.to
·
5d
·
Discuss:
DEV
💥
Cyberattack
Overcoming
IP Bans During Web Scraping in Legacy Python
Codebases
dev.to
·
5d
·
Discuss:
DEV
💥
Cyberattack
The Architecture of Trust:
Guardrails
for Production Generative AI Applications and the
Llama
…
pub.towardsai.net
·
5d
💥
Cyberattack
When AI Codes for
Hackers
: The 25-Minute
Ransomware
Reality
smarterarticles.co.uk
·
6d
🔍
Cyber threat intelligence
NFC storms back to beat
AFC
in Pro Bowl flag game full of stars,
scooters
and trick plays
nytimes.com
·
5d
🦹
cybercrime
Illegal
gold is
destroying
the Amazon… and our right to know 🌳
threadreaderapp.com
·
4d
🦹
cybercrime
Loading...
Loading more...
« Page 48
•
Page 50 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help