Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Vulnerability Research
CVE, zero-day, security research, bug hunting, disclosure
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183597
posts in
162.1
ms
The Week in Vulnerabilities: SharePoint, Fortinet, OpenClaw, and
GPL
Odorizers
🌍
Browser Exploits
malware.news
·
2d
Vulnerability
exploitation
surges often
precede
disclosure, offering possible early warnings
🔓
Hacking
cybersecuritydive.com
·
6d
IT Security Weekend
Catch
Up
📶
Wireless Security
badcyber.com
·
1d
Zero-Day Reality:
Vulnerabilities
Exploited
on Day One
🔓
Hacking
youtube.com
·
4d
CISA
Adds 4 Exploited Flaws to
KEV
, Sets May 2026 Federal Deadline
🪟
ETW Patching
thehackernews.com
·
1d
Claude
Mythos
: The 27-Year Bug That Should
Terrify
You
🌪️
Chaos Engineering
youtu.be
·
2d
·
DEV
Fuzzing
101: How Security Researchers Find
Bugs
Before Hackers Do
🛡️
Security Research
medium.com
·
3d
Dispatch from
VulnCon
: AI,
CVEs
, & cooperation
🎯
Security Conference Talks
runzero.com
·
6d
Weaponizing
Apathy
: How Threat Actors Exploit Vulnerabilities and Legitimate Software
🎭
Adversary Emulation
cofense.com
·
4d
'Defenders finally have a chance to win,
decisively
': Firefox CTO
raves
about Claude Mythos' bug hunting capabilities after it finds 271 vulnerabilities
🔓
Hacking
pcgamer.com
·
4d
AI Hype vs. Reality: Is AI Really
Rewriting
the Vulnerability
Equation
?
🛡️
LLM Security
recordedfuture.com
·
4d
OffSec
’s
Exploit
Database Archive
🌐
Web Exploits
exploit-db.com
·
4d
Recent Microsoft
Defender
Vulnerability
Exploited
as Zero-Day
🌍
Browser Exploits
securityweek.com
·
3d
Bug
Chaining
— The Skill That Turns Low
Bugs
Into Critical
💥
Exploit Development
medium.com
·
4d
Mozilla
: Anthropic's
Mythos
found 271 zero-day vulnerabilities in Firefox 150
🔓
Hacking
arstechnica.com
·
5d
·
Hacker News
Handling the CVE Flood With
EPSS
, (Mon,
Apr
20th)
🛡️
OWASP
isc.sans.edu
·
6d
LMDeploy
CVE-2026-33626 Flaw
Exploited
Within 13 Hours of Disclosure
💥
Exploit Dev
thehackernews.com
·
2d
Navigating the
Post-Mythos
Landscape with
Bitsight
📟
Firmware Analysis
bitsight.com
·
4d
AI Hype vs. Reality: Is AI Really
Rewriting
the Vulnerability
Equation
?
💥
Exploit Development
malware.news
·
4d
CISA Adds 8 Exploited Flaws to
KEV
, Sets April-May 2026 Federal
Deadlines
👁️
SIEM Evasion
thehackernews.com
·
5d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help