Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Firmware Analysis
Specific
firmware reversing, embedded binary, JTAG, binwalk, IoT security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183109
posts in
37.2
ms
Khost
: KVM-based Near Native MCU Firmware
Rehosting
ย
๐ง
Hypervisors
usenix.org
ยท
6d
Weak IoT security could make EV chargers
vulnerable
to mass
shutdowns
ย
โก
Electric Vehicles
techspot.com
ยท
2d
Feature Interview:
Nicholas
Carlini
, Anthropic
ย
๐ฌ
Anthropic
risky.biz
ยท
2d
A Linux-Like OS for the
Arduino
Uno
ย
๐
Microcontrollers
hackster.io
ยท
3d
IoT
Security: Threats, Best
Practices
and Secure-by-Design Strategies
ย
๐ก
IoT
iotbusinessnews.com
ยท
4d
AI Hype vs. Reality: Is AI Really
Rewriting
the Vulnerability
Equation
?
ย
๐
Vulnerability Research
malware.news
ยท
4d
A quick look at
Mythos
run on
Firefox
: too much hype?
ย
๐
Browser Exploits
xark.es
ยท
3d
ยท
Lobsters
,
Hacker News
,
Hacker News
,
r/firefox
Black Hat Stories | Or
Yair
, Security Research Team Lead at
SafeBreach
ย
๐ฏ
Security Conference Talks
youtube.com
ยท
5d
AI Hype vs. Reality: Is AI Really
Rewriting
the Vulnerability
Equation
?
ย
๐ก๏ธ
LLM Security
recordedfuture.com
ยท
5d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help