Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200096
posts in
31.7
ms
Hackers hack
victims
hacked
by other hackers
💻
hacker
techcrunch.com
·
6d
How to Identify and
Exploit
New
Vulnerabilities
💥
Exploit Development
blackhillsinfosec.com
·
1d
Shai-Hulud
's Source Code Leaked, Break Into Buildings for $, Reversing
EDRs
with AI
💣
Binary Exploitation
tldrsec.com
·
3h
There's a
devious
hacking scheme that involves a hijacked Microsoft Teams account, a fake IT
helpdesk
, and a covert infection tool
🎭
Social Engineering
pcgamer.com
·
1d
The Good, the Bad and the
Ugly
in
Cybersecurity
🔒
Container Security
sentinelone.com
·
6d
OffSec
’s
Exploit
Database Archive
💥
Exploit Dev
exploit-db.com
·
1d
Google finds hackers using AI to discover and
develop
a zero-day
exploit
for the first time for mass attacks
👨
indie hacker
tweaktown.com
·
2d
The
patching
treadmill
: Why traditional application security is no longer enough
🚧
Execution Guardrails
zdnet.com
·
3d
How to Identify and
Exploit
New
Vulnerabilities
💥
Exploit Development
malware.news
·
1d
A Complete History of
Cybersecurity
: From Early
Viruses
to AI-Powered Threats
🕰️
Computing History
recordedfuture.com
·
6d
Hackers
used AI to build a working
cyberattack
for the first time
🛡️
AI Security
phandroid.com
·
2d
The 30-Minute Breach: How an
Attacker
Went from Port Scan to Data
Exfiltration
on a Cloud Server
☁️
Cloud Security
medium.com
·
5d
Your Linux Box Has Been
Vulnerable
For 9 Years and Nobody
Knew
💣
Binary Exploitation
linuxstans.com
·
6d
Hackers Used AI to Develop First Known Zero-Day
2FA
Bypass for Mass
Exploitation
🛡️
AI Security
thehackernews.com
·
3d
AI is Breaking Two
Vulnerability
Cultures
🔓
Vulnerability Research
lesswrong.com
·
6d
Unplug
your way to better code
🔓
Vulnerability Research
blog.talosintelligence.com
·
6d
Where Have All the Complex Windows
Malware
and Their
Analyses
Gone?
🔓
Vulnerability Research
r136a1.dev
·
4d
·
Lobsters
Active attack: Dirty
Frag
Linux vulnerability expands
post-compromise
risk
🛡️
Exploit Mitigations
malware.news
·
5d
A Complete History of
Cybersecurity
: From Early
Viruses
to AI-Powered Threats
🕰️
Computing History
malware.news
·
5d
Unplug
your way to better code
🔓
Vulnerability Research
malware.news
·
6d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help