Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
25886
posts in
25.2
ms
AI
probably
does lead to more computer security
disasters
algorithmwatch.org
ยท
1d
๐ก๏ธ
AI Security
New iPhone
hacking
tool
puts
hundreds of millions of devices at risk
cultofmac.com
ยท
2d
๐
OSINT
Hacking
a Robot
Vacuum
schneier.com
ยท
2d
๐ณ
LLM Vulnerabilities
Unknown
attackers
exploit yet another critical
SharePoint
bug
theregister.com
ยท
1d
๐ฉ
CTF Writeups
matrixleons/evilwaf
:
evilwaf
is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
github.com
ยท
1d
ยท
Discuss:
Hacker News
โ๏ธ
Cloudflare
Russian hackers
exploit
Zimbra
flaw in Ukrainian govt attacks
bleepingcomputer.com
ยท
2d
๐ณ
LLM Vulnerabilities
Cyberattack
on a Car
Breathalyzer
Firm Leaves Drivers Stuck
wired.com
ยท
5h
๐๏ธ
Surveillance Capitalism
Untrusted
monitoring: extra
bits
lesswrong.com
ยท
18h
๐ก๏ธ
AI Security
iPhone Exploit
DarkSword
Steals Data In Minutes With No
Trace
apple.slashdot.org
ยท
2d
๐
Hardware Security
Hacking
the Xbox One
youtube.com
ยท
5d
ยท
Discuss:
Lobsters
๐ฉ
CTF Writeups
Robert
Haas
: Hacking
Workshop
for April/May 2026
postgr.es
ยท
2d
๐ค
Chaos Communication Congress
"Give up
Hack
Club": about the kids
non-profit
bafybeiew6lmntuivdzarz4rpscuhnkrpe4qpxi5xyel3jrzcvndulvl6gy.ipfs.dweb.link
ยท
1h
ยท
Discuss:
Hacker News
๐
Indie Hacking
Revisiting
Vulnerability Patch
Identification
on Data in the Wild
arxiv.org
ยท
2d
๐
Binary Analysis
The
Proliferation
of
DarkSword
: iOS Exploit Chain Adopted by Multiple Threat Actors
cloud.google.com
ยท
3d
๐
Hardware Security
Speed, Trust, and the
Compromised
Workbench
bishopfox.com
ยท
21h
๐
Hardware Security
Google,
iVerify
, and Lookout researchers discover
DarkSword
, a hacking tool used by Russia-sponsored and other hackers to target iOS 18 via Ukrainian websites (...
techmeme.com
ยท
3d
๐ฌ
Tech Newsletters
๐ฒ
anything
as a hidden service
dyyni.org
ยท
16h
๐
Tailscale
Venus
Protocol
accumulates
$2.15 million in bad debt after exploit
web3isgoinggreat.com
ยท
4d
๐
Indie Hacking
How SW and
HW
Vulnerabilities Can
Complement
LLM-Specific Algorithmic Attacks (UT Austin, Intel et al.)
semiengineering.com
ยท
20h
๐ณ
LLM Vulnerabilities
Hacking The System In A
Moral
Panic
: We Need To Talk
hackaday.com
ยท
3d
๐ค
Philosophy of Tech
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help