Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕳 LLM Vulnerabilities
Hacking LLMs, Prompt Injection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
27190
posts in
706.9
ms
The February 2026 Security Update Review
thezdi.com
·
1d
🔓
Hacking
Links 11/02/2026:
Fentanylware
(
CheeTok
) for ICE, Jimmy Lai Shows Journalism Became 'Crime' in Hong Kong
techrights.org
·
5h
📰
RSS Reading Practices
North Korean hackers use new macOS
malware
in
crypto-theft
attacks
bleepingcomputer.com
·
1d
🔓
Hacking
Hacking
the
Maclock
taoofmac.com
·
1d
🔍
Binary Analysis
Garnix
Blog:
Forwardly-evaluated
build systems
garnix.io
·
11h
·
Discuss:
Lobsters
🏗️
Build Systems
Single
prompt
breaks
AI safety in 15 major language models
infoworld.com
·
1d
🛡️
AI Safety
CVE-2026-1529 -
Org.keycloak.services.resources.organizations
:
keycloak
: unauthorized organization registration via
improper
invitation token validation
cvefeed.io
·
11h
·
Discuss:
Lobsters
🔓
Hacking
Information Flow Verification Framework
Integrating
Static and
Formal
Verification Methods At The Pre-Silicon Stage (U. of Florida)
semiengineering.com
·
1d
📐
TLA+
Plugin-Based
LLM
Workflows
agentplatform.app
·
1d
🦙
Ollama
RFC 4262: X.509 Certificate Extension for
Secure/Multipurpose
Internet Mail Extensions (
S/MIME
) Capabilities
rfc-editor.org
·
4h
🔤
Tokenization
CyberExplorer
: Benchmarking LLM Offensive Security Capabilities in a Real-World
Attacking
Simulation Environment
arxiv.org
·
1d
🏆
LLM Benchmarking
Hackable
Software
blog.abdellatif.io
·
23h
·
Discuss:
Hacker News
🔓
Hacking
Caption
Files and
Attribution
Reversal in LLMs
mikecaulfield.substack.com
·
4h
·
Discuss:
Substack
🪄
Prompt Engineering
Securing
GenAI
: Vol 5 — Model deployment and change management
pub.towardsai.net
·
1d
🛡️
AI Security
neo4j-labs/llm-graph-builder
:
Neo4j
graph construction from
unstructured
data using LLMs
github.com
·
6h
🦙
Ollama
Claude
Opus
4.6
Escalates
Things Quickly
lesswrong.com
·
2h
🔍
Quickwit
European
Commission
breached
computing.co.uk
·
6h
·
Discuss:
Hacker News
🔓
Hacking
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
2d
💉
Prompt Injection
Origin
of Indian National
Congress
magadhmahilacollege.org
·
8h
🔤
OFL
The LLM
Context
Tax: Best Tips for Tax
Avoidance
nicolasbustamante.com
·
4h
·
Discuss:
Hacker News
💰
Tokenomics
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help