Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2563
posts in
66.8
ms
qzxcvbn/Csa
: THE SOVEREIGN ACCESS CONSTANT (
CsaC
_{sa} Csaโ) A Universal Open Standard for Passwordless, Zero-Knowledge Internet & Device Authentication
github.com
ยท
1d
ยท
Discuss:
Hacker News
๐ง
Linux
The Security
Gap
in MCP: The Hidden Risks No One Is
Talking
About
memgraph.com
ยท
10h
ยท
Discuss:
Hacker News
๐
Reverse Engineering
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
ยท
11h
ยท
Discuss:
Hacker News
๐๏ธ
Software Design
CISA
gives federal agencies one year to
rip
out end-of-life devices
therecord.media
ยท
1d
ยท
Discuss:
Hacker News
๐
Electronics
Google's Cyber
Disruption
Unit
Kicks
Its First Goal
lawfaremedia.org
ยท
13h
ยท
Discuss:
Hacker News
๐
System Design
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
ยท
1d
ยท
Discuss:
Hacker News
๐ง
Linux
ICE and
CBP
โs Face-Recognition App Canโt Actually
Verify
Who People Are
wired.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Reverse Engineering
Going Through
Snowden
Documents
, Part 5
libroot.org
ยท
28m
ยท
Discuss:
Hacker News
๐
Reverse Engineering
Sammฤ
Suit โ Open-source security armor for AI agents (all 8 layers
enforced
)
sammasuit.com
ยท
17h
ยท
Discuss:
Hacker News
๐ง
Linux
Notes from the Asia-Pacific region: Breach exposes
gaps
in
NZ
's privacy framework
iapp.org
ยท
1d
ยท
Discuss:
Hacker News
๐๏ธ
Databases
Accounts get
taken
over without "
hacks
", step by step
systemweakness.com
ยท
1d
ยท
Discuss:
Hacker News
๐ฅ๏ธ
Self-Hosting
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
ยท
19h
ยท
Discuss:
Hacker News
,
r/programming
๐
Reverse Engineering
On the Promises of '
High-Assurance
'
Cryptography
symbolic.software
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
๐
Reverse Engineering
Exactly Once Operations: Why
Idempotency
Belongs
in the Business Layer
equatorops.com
ยท
13h
ยท
Discuss:
Hacker News
โ๏ธ
System Programming
How we found
exploitable
security flaws in
OpenClaw
that manual review missed
cubic.dev
ยท
1d
ยท
Discuss:
Hacker News
๐
Reverse Engineering
AWS
intruder
achieved
admin access in under 10 minutes thanks to AI assist, researchers say
theregister.com
ยท
2d
ยท
Discuss:
Hacker News
,
Hacker News
๐
Reverse Engineering
stdlib
v7.2
erlang.org
ยท
18h
ยท
Discuss:
Hacker News
๐
Postgres
Recent
trends in the work of the
Django
Security Team
djangoproject.com
ยท
2d
ยท
Discuss:
Lobsters
,
Hacker News
๐ป
Programming
I built a digital safe with multiple
keys
after a few too many bike
concussions
eljojo.github.io
ยท
23h
ยท
Discuss:
Hacker News
,
Hacker News
๐
Reverse Engineering
OpenClaw
Partners with
VirusTotal
for Skill Security
openclaw.ai
ยท
10h
ยท
Discuss:
Hacker News
๐ป
Programming
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help