Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Parser Security
Input Validation, Zip Bombs, ReDoS, Attack Vectors
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
198941
posts in
30.2
ms
On the Complexity of the Matching Problem of Regular
Expressions
with
Backreferences
🔍
Text Indexing
arxiv.org
·
3d
Siemens
Ruggedcom
Rox
🔌
Offline Computing
cisa.gov
·
9h
GitHub
Actions
Self-Hosted
Runners
: 3 Security Risks
🔒
Runtime Security
tildalice.io
·
2d
Aurora
Mobile Threat Defense is Now Available
🔒
Email Security
malware.news
·
2d
VU#471747:
dnsmasq
contains several vulnerabilities, including attacker DNS
redirect
, privilege escalation, and heap manipulation
🔁
DNS Rebinding
kb.cert.org
·
3d
OpenAI’s New
Daybreak
Platform Brings AI Into
Cybersecurity
Defense
🔌
AI Integration
community.designtaxi.com
·
2d
How We
Implemented
Content Security Policy (
CSP
) in Our Laravel App
🛡️
Content Security Policy
blog.shakiltech.com
·
6d
·
DEV
cPanel
,
WHM
Release Fixes for Three New Vulnerabilities
🌍
Browser Exploits
thehackernews.com
·
5d
Exploiting Insecure Output Handling in LLMs via
Indirect
Prompt Injection (
XSS
)
🕳
LLM Vulnerabilities
infosecwriteups.com
·
1d
AI and HTML: Validating,
Omitting
Optional Code, and
Minifying
as Token Optimization
🤖
AI Codegen
meiert.com
·
2d
Latent Personality Alignment: Improving
Harmlessness
Without
Mentioning
Harms
🏠
Self-hosted AI
arxiv.org
·
2d
Parseltongue
3.1
✅
Format Verification
arcanum-sec.github.io
·
3d
Vulnerability in
Verint
Verba
software
🕳
LLM Vulnerabilities
malware.news
·
9h
Why I Built an ML-Powered Secrets
Detector
Instead of Just Using
Regex
🧪
Binary Fuzzing
github.com
·
4d
·
DEV
Resilience of
IEC
61850
Sampled
Values-Based Protection Systems Under Coordinated False Data Injections
🩹
Self-Healing Systems
arxiv.org
·
3d
OverrideFuzz
: Semantic-Aware Grammar
Fuzzing
for Script-Runtime Vulnerabilities
🎲
Parser Fuzzing
arxiv.org
·
19h
Using
IDA
to Find
Bugs
in
IDA
(with Claude)
💣
Binary Exploitation
malware.news
·
6d
Siemens
Ruggedcom
Rox
🔌
Offline Computing
cisa.gov
·
9h
When Prompts Become
Payloads
: A Framework for
Mitigating
SQL Injection Attacks in Large Language Model-Driven Applications
🛡️
AI Security
arxiv.org
·
2d
When the
Ruler
is Broken: Parsing-Induced
Suppression
in LLM-Based Security Log Evaluation
🎲
Parser Fuzzing
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help