Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
👁️ Biometrics
Fingerprints, Facial Recognition, Authentication, Spoofing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186556
posts in
23.3
ms
WaTF
Bank
Walkthrough
(Part 4): Exploiting Android App Security Flaws
💻
Hacking
infosecwriteups.com
·
2d
Announcing
Microsoft Drivers 5.13.1 for
PHP
for SQL Server
🔒
Hardware Security
techcommunity.microsoft.com
·
12h
Generalized
Disguise
Makeup
Presentation Attack Detection Using an Attention-Guided Patch-Based Framework
🎭
Steganography
arxiv.org
·
1d
3 Seconds of Audio Can
Clone
Your CEO's Voice. Here's What Actually
Stops
the Scam.
🎪
Social Engineering
caracomp.com
·
4d
·
DEV
Beyond the
perimeter
: Why
identity
and cyber security are one single story
🎪
Social Engineering
itsecurityguru.org
·
2d
Lifetime chemical sensor arrays of organic
fluorophores
for bacterial
fingerprinting
🤖
Machine Learning
nature.com
·
3d
COD434/create-authenik8-app
: A lightweight authentication infrastructure generator powered by an internal Identity Engine.
🕶️
Privacy Tech
github.com
·
1d
·
Hacker News
Over 2.8 billion
credentials
stolen in 2025 as ransomware
evolves
🎪
Social Engineering
betanews.com
·
1d
LINKEDIN
BROWSERGATE
🔍
Reverse Engineering
securityaffairs.com
·
3d
The latest
phishing
scam? Fake party
invitations
. Here's how to spot them.
🎪
Social Engineering
ketv.com
·
1d
Website Security Configuration Audit from Android in 15 Minutes:
curl
,
openssl
, dig
🛡️
Network Security
github.com
·
1d
·
DEV
The EU Digital
Wallet
: Why
Waiting
is Not an Option
⛓️
Blockchain
malware.news
·
3d
Free trust & safety
checker
for vibe
coded
sites.. Would love feedback
🔒
Hardware Security
surmado.com
·
1d
·
r/vibecoding
The Missing Key to
x402
(5 minute read)
⛓️
Blockchain
olshansky.substack.com
·
4d
·
Substack
Trisul
Product Update: 2FA Authentication, MITRE ATT&CK Detection, AI-Powered Network Analytics, and
IPAM
🔒
Hardware Security
trisul.org
·
2d
I'm officially 'un-locked' and ready to
scroll
, as long as I'm on my
couch
💻
Hacking
androidpolice.com
·
2d
DORA
and operational resilience:
Credential
management as a financial risk control
🔒
Hardware Security
bleepingcomputer.com
·
6d
Disneyland
implements
facial recognition to keep the lines moving, but guests say they didn’t know it was optional
🎪
Social Engineering
fortune.com
·
2d
Espresso
Shots
4-26-26
🧠
Polymath
makoism.com
·
4d
Microsoft Confirms Active
Exploitation
of Windows Shell
CVE-2026-32202
💻
Hacking
thehackernews.com
·
2d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help