Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
π Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
185914
posts in
31.0
ms
Shai-Hulud
's Source Code Leaked, Break Into Buildings for $, Reversing
EDRs
with AI
Β
π
Cybersecurity
tldrsec.com
Β·
6d
Risky
Business #838 -- GitHub
investigates
possible breach
Β
π οΈ
Open Source
risky.biz
Β·
17h
OffSec
βs
Exploit
Database Archive
Β
π©
CTF
exploit-db.com
Β·
5d
Critical Microsoft
Vulnerabilities
Doubled
: From Exposure to Escalation
Β
π
Security
bleepingcomputer.com
Β·
1d
OpenAI Confirms Breach π€, 18-Year
NGINX
Rift
RCE
π, Two New Windows 0-Days πͺ
Β
π©
CTF
tldr.tech
Β·
5d
Broken Authentication: How
Attackers
Gain
Unauthorized
Access to Your Application.
Β
π©
CTF
infosecwriteups.com
Β·
2d
Week in review: Cisco patches
SD-WAN
0-day,
unpatched
Microsoft Exchange Server flaw exploited
Β
π
Cybersecurity
helpnetsecurity.com
Β·
3d
The time of much
patching
is coming
Β
π©
CTF
malware.news
Β·
6d
Vulnerability
Summary
for the Week of May 11, 2026
Β
π©
CTF
cisa.gov
Β·
2d
Four OpenClaw
Flaws
Enable Data Theft, Privilege Escalation, and
Persistence
Β
π
OSINT
thehackernews.com
Β·
5d
Mythos-Based
Techniques
Uncover
Vulnerabilities in Appleβs iOS
Β
π
Cybersecurity
pymnts.com
Β·
6d
Security
anxiety
leads to
destruction
of working kit
Β
π
Cybersecurity
betanews.com
Β·
1d
CySecurity News - Latest Information Security and Hacking Incidents:
Trojanized
DAEMON
Tools Used to Deploy Persistent Backdoor Malware
Β
π
OSINT
cysecurity.news
Β·
2d
Β·
Blogger
The
Assignment
Was to Hack the
Grader
Β
π
Cybersecurity
5 Dakikada Teknoloji GΓΌndemi <team@aposto.com> via kill-the-newsletter.com
Β·
5d
The
primary
sources of near-term
cybersecurity
risk
Β
π
Cybersecurity
lesswrong.com
Β·
6d
Verizon
DBIR
2026: Vulnerability Exploitation Overtakes
Credential
Theft as Top Breach Vector
Β
π
Cybersecurity
securityweek.com
Β·
22h
Hackers
Donβt Need to Break In. The
Door
Is Already Open
Β
π
Cybersecurity
medium.com
Β·
6d
Verizon
DBIR
: AI Helped Hackers Exploit Vulnerabilities in 31% of Recent
Breaches
Β
π
Security
hackread.com
Β·
10h
Recommendations
for books exploring the history of
hacking
?
Β
π
Cybersecurity
discuss.privacyguides.net
Β·
4d
First Apple M5 memory exploit discovered using Anthropic AI, gives root access on MacOS β Claude
Mythos
helps security researchers bypass Memory
Integrity
Enforcement
Β
π
OSINT
tomshardware.com
Β·
4d
Β·
Hacker News
,
r/technology
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help