Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Evasion Techniques
AV evasion, EDR bypass, payload obfuscation, defense evasion
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
21096
posts in
34.3
ms
Payload
Obfuscation
2026 — Encoding, Encryption & Packing
Shellcode
for AV Bypass
💥
Binary Exploitation
dev.to
·
17h
·
DEV
I tried to
hack
my local AI agent with Prompt Injection. It
laughed
at me.
🛡️
AI Security
hermes-codex.vercel.app
·
4d
·
DEV
Hackers Abuse
QEMU
for Defense
Evasion
💀
Kernel Exploitation
oodaloop.com
·
8h
Making
opportunistic
cyberattacks
harder by design
🚧
Execution Guardrails
malware.news
·
1d
Why Every Defense Against Prompt
Injection
Gets
Broken
🧠
Context Engineering
dzone.com
·
1d
Beyond the breach: inside a cargo theft actor’s
post-compromise
playbook
🍯
Deception Technology
proofpoint.com
·
6d
No
Exploit
Needed: How
Attackers
Walk Through the Front Door via Identity-Based Attacks
🎟️
Kerberos Attacks
thehackernews.com
·
10h
Adversaries
hijacked
AI security tools at 90+ organizations. The next wave has write access to the firewall
🛡️
AI Security
venturebeat.com
·
1d
Spotting
the spyware: How modern spies are
weaponizing
phishing
🍯
Deception Technology
techradar.com
·
12h
LLM-tier
personal computer security
🔐
Hardware Security
lesswrong.com
·
6d
A7A5
: A breakout sanctions
evasion
capability
⚔️
Offensive Secuity
newsletter.insightthreatintel.com
·
9h
CIA
Triad
, Authentication &
Authorization
in Cybersecurity (2026)
🔒
Security
dev.to
·
1d
·
DEV
Avinash-Amudala/AgentShield
: The runtime firewall for AI agents. Protect any agent in 3 lines of code.
📋
AGENTS.md
github.com
·
4d
·
DEV
The Q1
vulnerability
pulse
🔓
Vulnerability Research
blog.talosintelligence.com
·
5d
Void
Stealer
: The
Infostealer
Malware Quietly Targeting Organizations in 2026
👁️
SIEM Evasion
socradar.io
·
5d
Sensitive
Data Exposure - The Bug That Looks Like a Feature Working
Correctly
🪟
ETW Patching
dev.to
·
1d
·
DEV
Information Security
Concepts
Explained: Risk,
Vulnerabilities
, Threats & Controls (2026)
🔒
Security
dev.to
·
1d
·
DEV
Fake Google
Antigravity
downloads
are stealing accounts in minutes
🪝
COM Hijacking
malware.news
·
7h
ThreatsDay
Bulletin: Defender 0-Day,
SonicWall
Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
🚧
Execution Guardrails
thehackernews.com
·
5d
REDSUN
:The “Portal”
Trick
to God-Mode
💥
Binary Exploitation
malware.news
·
7h
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help