Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
20737
posts in
260.4
ms
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
11h
🔐
Hardware Security
A
Horrible
Conclusion
addisoncrump.info
·
22h
·
Discuss:
Lobsters
,
Hacker News
🛡️
AI Security
Russian-state hackers
exploit
Office vulnerability to
infect
computers
arstechnica.com
·
3d
·
Discuss:
r/technews
🕳
LLM Vulnerabilities
It took a researcher fewer than 2 hours to
hijack
OpenClaw
thenewstack.io
·
2d
·
Discuss:
Hacker News
💉
Prompt Injection
Phantom Transfer: Data-level
Defences
are
Insufficient
Against Data Poisoning
arxiv.org
·
2d
💉
Prompt Injection
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
3d
👨💻
Software development practices
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
2d
🔍
Binary Analysis
CrossCurve
users
exploited
for around $3 million
web3isgoinggreat.com
·
13h
💰
Web Monetization API
Multimodal Prompt Injection: The
Polyglot
SVG
Attack on AI
instatunnel.my
·
2d
·
Discuss:
r/programming
🛡️
AI Security
How I caught and
punished
my Substack
impersonator
💥
marketingideas.com
·
5h
💉
Prompt Injection
Critlist/protoHack
: Restoring Jay Fenlason's original 1981—1982 Hack to run on modern Linux.
github.com
·
13h
·
Discuss:
Hacker News
🚀
Indie Hacking
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humans’ Data
wired.com
·
1d
🛡️
AI Security
Modern AI is a
soldering
iron
aleksei.dev
·
18h
🛡️
AI Security
Backdoor
in
Notepad
++
schneier.com
·
2d
·
Discuss:
schneier.com
🕳
LLM Vulnerabilities
17% of 3rd-Party
Add-Ons
for
OpenClaw
Used in Crypto Theft and macOS Malware
hackread.com
·
1d
🚀
Indie Hacking
Part 1 the Persistent
Vault
Issue: Your Encryption Strategy Has a
Shelf
Life
news.ycombinator.com
·
6h
·
Discuss:
Hacker News
💾
Persistence Strategies
Unlocking
a better future with old
computers
goodinternetmagazine.com
·
2d
🏛️
Computer Architecture History
Going Through
Snowden
Documents
, Part 1
libroot.org
·
16h
·
Discuss:
Lobsters
🚀
Indie Hacking
We have
broken
SHA-1
in practice
shattered.io
·
15h
·
Discuss:
Hacker News
🕳
LLM Vulnerabilities
Security vulnerability in
TeamViewer
bypassed
permission checks
techzine.eu
·
1d
🕳
LLM Vulnerabilities
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help