Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Vulnerability Research
CVE, zero-day, security research, bug hunting, disclosure
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18067
posts in
27.8
ms
How to
catch
CVE
’s on time
🪟
ETW Patching
dev.to
·
1d
·
DEV
·
…
Attackers Rapidly
Weaponize
Critical Oracle
WebLogic
RCE, Honeypot Study Finds
🎯
Threat Intel
infosecurity-magazine.com
·
6d
·
…
'What if the AI agent you just
deployed
was secretly working against you?':
Vertex
AI 'double agent' flaw exposes customer data and Google's internal code
🛡️
AI Security
techradar.com
·
14h
·
…
New Chrome Zero-Day
CVE-2026-5281
Under Active
Exploitation
🚧
Execution Guardrails
thehackernews.com
·
18h
·
…
Vulnerability Research Is
Cooked
(
sockpuppet.org
)
💥
Binary Exploitation
lwn.net
·
1d
·
…
Claude Code's New Cybersecurity
Guardrails
: How to Keep Your Security Research
Flowing
📋
AGENTS.md
gentic.news
·
4d
·
DEV
·
…
April 1, 2026
🐛
Fuzzing
the grugq's newsletter via buttondown.com
·
9h
·
…
AI coding agents will
drastically
alter
both the practice and the economics of exploit development, automating the discovery of zero-day vulnerabilities (Thomas...
📋
AGENTS.md
techmeme.com
·
2d
·
…
CYBERDUDEBIVASH
Sentinel
APEX™ — Building a Real-Time AI Cyber Threat Intelligence Platform from…
🎯
Threat Intelligence
cyberdudebivash.medium.com
·
5d
·
…
CTO
at
NCSC
Summary: week ending March 29th
🔒
Cybersecurity
ctoatncsc.substack.com
·
4d
·
Substack
·
…
Coruna
: the framework used in Operation
Triangulation
💥
Exploit Dev
malware.news
·
6d
·
…
Cloudflare
Client-Side Security:
smarter
detection, now open to everyone
☁️
Cloud Security
blog.cloudflare.com
·
3d
·
Hacker News
·
…
Critical
Citrix
NetScaler
Vulnerability Exploited in the Wild
🎫
ADCS Attacks
infosecurity-magazine.com
·
2d
·
…
Your AI Coding Agent Has
Root
Access to Your Machine. Does Anything
Else
?
🚧
Execution Guardrails
dev.to
·
2d
·
DEV
·
…
TrueConf
Zero-Day
Exploited
in Attacks on Southeast Asian Government Networks
💥
Exploit Dev
thehackernews.com
·
1d
·
…
The Q1 2026 DeFi Exploit
Autopsy
: $
137M
Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One
💥
Binary Exploitation
dev.to
·
6d
·
DEV
·
…
CISA Adds CVE-2025-53521 to
KEV
After Active F5 BIG-IP
APM
Exploitation
🛡️
AMSI
thehackernews.com
·
4d
·
…
The AI Exploit Agent: How Autonomous AI
Discovers
DeFi
Vulnerabilities at $0.50/Attempt
🛡️
AI Security
dev.to
·
3d
·
DEV
·
…
Inside a Cyber Attack: How Hackers Think,
Operate
, and
Exploit
Systems
🔒
Security
dev.to
·
5d
·
DEV
·
…
EVMbench
Deep Dive: Can AI Agents Actually Find Smart Contract Bugs Better Than Human
Auditors
? We Tested the Claims
📋
AGENTS.md
dev.to
·
4d
·
DEV
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help