Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
20720
posts in
538.1
ms
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
1h
🔐
Hardware Security
A
Horrible
Conclusion
addisoncrump.info
·
11h
·
Discuss:
Lobsters
,
Hacker News
🛡️
AI Security
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
1d
🔍
Binary Analysis
Russian-state hackers
exploit
Office vulnerability to
infect
computers
arstechnica.com
·
3d
·
Discuss:
r/technews
🕳
LLM Vulnerabilities
It took a researcher fewer than 2 hours to
hijack
OpenClaw
thenewstack.io
·
2d
·
Discuss:
Hacker News
💉
Prompt Injection
Phantom Transfer: Data-level
Defences
are
Insufficient
Against Data Poisoning
arxiv.org
·
1d
💉
Prompt Injection
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
2d
👨💻
Software development practices
CrossCurve
users
exploited
for around $3 million
web3isgoinggreat.com
·
2h
💰
Web Monetization API
Multimodal Prompt Injection: The
Polyglot
SVG
Attack on AI
instatunnel.my
·
2d
·
Discuss:
r/programming
🛡️
AI Security
Critlist/protoHack
: Restoring Jay Fenlason's original 1981—1982 Hack to run on modern Linux.
github.com
·
2h
·
Discuss:
Hacker News
🚀
Indie Hacking
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humans’ Data
wired.com
·
13h
🛡️
AI Security
Modern AI is a
soldering
iron
aleksei.dev
·
8h
🛡️
AI Security
17% of 3rd-Party
Add-Ons
for
OpenClaw
Used in Crypto Theft and macOS Malware
hackread.com
·
1d
🚀
Indie Hacking
Backdoor
in
Notepad
++
schneier.com
·
2d
·
Discuss:
schneier.com
🕳
LLM Vulnerabilities
We have
broken
SHA-1
in practice
shattered.io
·
4h
·
Discuss:
Hacker News
🕳
LLM Vulnerabilities
Unlocking
a better future with old
computers
goodinternetmagazine.com
·
1d
🏛️
Computer Architecture History
Going Through
Snowden
Documents
, Part 1
libroot.org
·
5h
·
Discuss:
Lobsters
🚀
Indie Hacking
The Next Open Source Security Race:
Triage
at Machine Speed ...
socket.dev
·
1d
🔓
Open Source Software
Security vulnerability in
TeamViewer
bypassed
permission checks
techzine.eu
·
1d
🕳
LLM Vulnerabilities
The
logs
I never read
pydantic.dev
·
5h
·
Discuss:
Hacker News
📝
Write-Ahead Log
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help