Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🕵️ Evasion Techniques
AV evasion, EDR bypass, payload obfuscation, defense evasion
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
199661
posts in
42.2
ms
PhishSigma
++: Malicious Email Detection with
Typed
Entity Relations
🔒
Email Security
arxiv.org
·
1d
Hackers
Use AI for
Exploit
Development, Attack Automation
🔓
Hacking
darkreading.com
·
3d
ThreatsDay
Bulletin: PAN-OS RCE, Mythos cURL Bug, AI
Tokenizer
Attacks, and 10+ Stories
🐛
Bug Bounty
thehackernews.com
·
2h
Defending Against
CORDIAL
SPIDER and
SNARKY
SPIDER with Falcon Shield
🍯
Deception Technology
crowdstrike.com
·
10h
Undermining
the trust boundary: Investigating a
stealthy
intrusion through third-party compromise
🚧
Execution Guardrails
malware.news
·
2d
Network Analysis:
Malware
Compromise
🦠
Malware Analysis
deolbytes.medium.com
·
4d
Inside AD CS Escalation:
Unpacking
Advanced
Misuse
Techniques and Tools
🚧
Execution Guardrails
unit42.paloaltonetworks.com
·
2d
How to Identify and
Exploit
New
Vulnerabilities
💥
Exploit Development
blackhillsinfosec.com
·
1d
73
Seconds
to Breach, 24 Hours to Patch: The Case for Autonomous
Validation
🚧
Execution Guardrails
bleepingcomputer.com
·
1d
The time of much
patching
is coming
🐛
Bug Bounty
malware.news
·
34m
Aquaman
: A Transparent Proxy Architecture for Quantum Resilient Key
Establishment
🔐
Quantum Security
arxiv.org
·
3d
Undermining
the trust boundary: Investigating a
stealthy
intrusion through third-party compromise
🚧
Execution Guardrails
microsoft.com
·
2d
GTIG
AI Threat Tracker:
Adversaries
Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
🛡️
AI Security
malware.news
·
3d
Guaranteed
Jailbreaking
Defense via
Disrupt-and-Rectify
Smoothing
💉
Prompt Injection
arxiv.org
·
2d
How to Identify and
Exploit
New
Vulnerabilities
💥
Exploit Development
malware.news
·
1d
Evaluating Prompt Injection Defenses for Educational LLM
Tutors
:
Security-Usability-Latency
Trade-offs
🕳
LLM Vulnerabilities
arxiv.org
·
3d
Defending
consumer web properties against modern
DDoS
attacks
🛡️
DDoS Mitigation
malware.news
·
2d
Cochise
: A Reference Harness for Autonomous
Penetration
Testing
🛡️
AI Security
arxiv.org
·
1d
Why Do Aligned LLMs Remain
Jailbreakable
:
Refusal-Escape
Directions, Operator-Level Sources, and Safety-Utility Trade-off
🕳
LLM Vulnerabilities
arxiv.org
·
2d
ObfAx
:
Obfuscation
and IP Piracy Detection in Approximate Circuits
🔌
Hardware Security
arxiv.org
·
2d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help