Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Vulnerability Research
CVE, zero-day, security research, bug hunting, disclosure
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
21683
posts in
17.5
ms
The Art of the Code Review: More Than Just
Bug
Hunting
dev.to
·
16h
·
Discuss:
DEV
🔍
Static Analysis
Veeam
Backup &
Replication
: CVE-2026-21666 and Related RCE Fixes
socradar.io
·
1d
🔐
Hardware Security
The Zero-Day
Scramble
is
Avoidable
: A Guide to Attack Surface Reduction
thehackernews.com
·
4d
💥
Binary Exploitation
AWS Launches Managed
Openclaw
on
Lightsail
Amid Critical Security Vulnerabilities
infoq.com
·
27m
🚩
CTF
I’m a cybersecurity
professional
, here’s why I’m preparing for an AI data
breach
techradar.com
·
35m
🛡️
AI Security
Weekend
Reading
labnotes.org
·
15h
🗒️
Obsidian
ESET
launches
eCrime
Reports to track ransomware and infostealer attacks
betanews.com
·
1d
🎯
Threat Intelligence
OSINT
with
Maltego
— A Complete Guide for Ethical Hackers
redfoxsecurity.medium.com
·
23h
🕵️
Investigative OSINT
Windows 11 bug is
rasing
hell for users and Samsung
laptops
are worst hit
digitaltrends.com
·
14h
🔐
Hardware Security
301 Million Patient Records Exposed: The
HIPAA
Breach
Epidemic
Nobody Is Talking About
ciphercue.com
·
1d
·
Discuss:
Hacker News
🚨
Triage
EP206
: Git Workflow: Essential
Commands
blog.bytebytego.com
·
19h
🐚
Shell Scripting
Less-relevant results
Daily Deal: The All-in-One
Super-Sized
Ethical
Hacking Bundle
techdirt.com
·
2d
🔒
Security
Cloud
Sustainability
Research
forms.gle
·
1d
·
Discuss:
DEV
,
r/sysadmin
☁️
Cloud Architecture
Invisible malicious code attacks 151 GitHub
repos
and VS Code —
Glassworm
attack uses blockchain to steal tokens, credentials, and secrets
tomshardware.com
·
20h
💥
Exploit Dev
A set of
AppArmor
vulnerabilities
lwn.net
·
1d
🔍
Binary Diffing
The Risk
Profile
of AI-Driven Development
devops.com
·
1d
🛡️
AI Safety Evals
tomvaillant/osint-tool-database
huggingface.co
·
19h
🕵️
OSINT
Researchers Discover Major Security
Gaps
in LLM
Guardrails
infosecurity-magazine.com
·
3d
🛡️
AI Security
CISA
warns
max-severity
n8n bug is being exploited in the wild
theregister.com
·
2d
💥
Exploit Dev
Risky Bulletin: Another
residential
proxy provider falls as authorities continue
crackdowns
news.risky.biz
·
2d
🔐
Hardware Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help