๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
The Current State of Browser Cookies
cyberark.com
ยท
17h
ยท
Discuss:
Hacker News
๐ป
Programming
My Bank Keeps on Undermining Anti-Phishing Education
moritz-mander.de
ยท
2d
ยท
Discuss:
Hacker News
๐
Postgres
What's Missing in the Debate on Online Freedom of Expression in US, Brazil
techpolicy.press
ยท
14h
ยท
Discuss:
Hacker News
๐ป
Programming
Google Wifi Pro: Glitching from Root to EL3: Part 1 - Characterization
raelize.com
ยท
4d
ยท
Discuss:
Lobsters
,
Hacker News
๐ง
Linux
Pre-Auth SQLi to RCE โ Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
labs.watchtowr.com
ยท
5d
ยท
Discuss:
Hacker News
๐ป
Programming
Linux and Secure Boot certificate expiration
lwn.net
ยท
1d
ยท
Discuss:
Lobsters
,
Hacker News
๐ง
Linux
A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers
propublica.org
ยท
5d
ยท
Discuss:
Hacker News
,
r/cybersecurity
๐
Reverse Engineering
Latest VMware Critical vulnerabilities VMSA-2025-0013
support.broadcom.com
ยท
4d
ยท
Discuss:
Hacker News
๐ง
Linux
Security is a Renewals Problem: How to negotiate in vendor renewals
securityis.substack.com
ยท
15h
ยท
Discuss:
Substack
๐ฅ๏ธ
Self-Hosting
No, phishers are not bypassing FIDO MFA, at least not yet. Hereโs why.
arstechnica.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Reverse Engineering
Show HN: Default-Exploitability Context for CISA Known Exploited Vulnerabilities
github.com
ยท
2d
ยท
Discuss:
Hacker News
,
Hacker News
๐๏ธ
Software Design
Reversing a Fingerprint Reader Protocol (2021)
blog.th0m.as
ยท
11h
ยท
Discuss:
Hacker News
๐ง
Linux
A Look Back at WeChat's PhxSQL and the 'Fastest Majority'
supasaf.com
ยท
18h
ยท
Discuss:
Hacker News
๐
Postgres
How TPMs Work and Why We Added Support in Bottlerocket
molnett.com
ยท
2d
ยท
Discuss:
Hacker News
,
r/linux
๐ง
Linux
Stop the Next Breach: Cyber Graphs for Post-Incident Network Monitoring
memgraph.com
ยท
3d
ยท
Discuss:
Hacker News
๐
System Design
Billions of Tokens Later: Scaling LLM Fuzzing in Practice
gusarich.com
ยท
1d
ยท
Discuss:
Hacker News
๐น
Golang
Amazon Ring Cashes in on Techno-Authoritarianism and Mass Surveillance
eff.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Electronics
WireGuard client for macOS doesn't support split tunneling so I made one
medium.com
ยท
2d
ยท
Discuss:
Hacker News
๐ฅ๏ธ
Self-Hosting
Watch out, another max-severity, make-me-root Cisco bug on the loose
theregister.com
ยท
2d
ยท
Discuss:
Hacker News
๐ง
Linux
Popular NPM linter packages hijacked via phishing to drop malware
bleepingcomputer.com
ยท
18h
ยท
Discuss:
Hacker News
๐
Reverse Engineering
Loading...
Loading more...
« Page 2
โข
Page 4 »