Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cybersecurity
Hacking, Exploits, Zero-day, Infosec, Vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8442
posts in
10.6
ms
Cybersecurity
, Infrastructure & Web Development
🔐
InfoSec
atomic.computer
·
1d
·
…
CTO
at
NCSC
Summary: week ending March 29th
🔐
InfoSec
ctoatncsc.substack.com
·
5d
·
Substack
·
…
vSphere
and
BRICKSTORM
Malware: A Defender's Guide
🔐
Hardware Security
cloud.google.com
·
6h
·
…
Earlier today, a malicious actor gained unauthorized access to Drift Protocol through a novel attack involving durable
nonces
,
resulting
in a rapid takeover of ...
🔧
Protocol Fuzzing
threadreaderapp.com
·
16h
·
…
Risky
Business #831 -- The AI
bugpocalypse
begins
🚩
CTF
risky.biz
·
1d
·
…
cisco-ai-defense/defenseclaw
: Security Governance for Agentic AI
🛡️
AI Security
github.com
·
3d
·
Hacker News
·
…
Veeam at
TFDx
RSAC
2026: Three Generations of Resilience
🔐
Hardware Security
packetqueue.net
·
7h
·
…
DEW
#150 - macOS Endpoint Security Firewall,
EDR
telemetry updates & Supply Chain Bonanza
🔒
Runtime Security
detectionengineering.net
·
1d
·
…
LWN.net
Weekly Edition for April 2, 2026
🚩
CTF
lwn.net
·
20h
·
…
Is “
Hackback
” Official US
Cybersecurity
Strategy?
🔐
InfoSec
schneier.com
·
1d
·
Hacker News
,
schneier.com
·
…
Irony
is dead - IT Security company
compromised
🔐
InfoSec
youtube.com
·
6d
·
…
AutoEG
:
Exploiting
Known Third-Party Vulnerabilities in Black-Box Web Applications
🔒
Runtime Security
arxiv.org
·
16h
·
…
The Cybersecurity Value Chain: How 25 Companies
Fill
72
Foundational
Roles
🔐
InfoSec
hackernoon.com
·
1d
·
…
Vulnerability
Research Is
Cooked
🔒
Runtime Security
sockpuppet.org
·
3d
·
Lobsters
,
Hacker News
,
r/netsec
·
…
DORA
& Threat Lead
Penetration
Testing with Marko
🔐
InfoSec
terokarvinen.com
·
2d
·
…
Email
Security for Google &
M365
🔐
InfoSec
material.security
·
2d
·
…
Open Source
Vulnerabilities
🔒
Runtime Security
osv.dev
·
3d
·
…
Post-Quantum
Cryptography
: Market Trends and
Innovations
🔐
Cryptography
globaldata.com
·
6d
·
…
Possible US Government iPhone
Hacking
Tool
Leaked
🔧
Reverse Engineering
schneier.com
·
10h
·
…
Router
Security
🔐
Hardware Security
routersecurity.org
·
6d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help