Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
406
posts in
16.6
ms
Security
Horror Stories
🔧
Firmware Security
securityhorrors.com
·
6d
·
Hacker News
Exploit
released for new PinTheft Arch Linux root
escalation
flaw
🔐
Hardware Security
bleepingcomputer.com
·
17h
·
Hacker News
9 Year-Old PHP
Vulnerability
Keeps Swinging As One of the Most Targeted Vulnerabilities | Blog
🕳
LLM Vulnerabilities
vulncheck.com
·
1d
·
Hacker News
Google publishes
exploit
code
threatening
millions of Chromium users
🕳
LLM Vulnerabilities
arstechnica.com
·
9h
·
Hacker News
,
r/programming
CVE-2025-54518
🔐
Hardware Security
nvd.nist.gov
·
1d
·
Hacker News
First Apple M5 memory
exploit
discovered using Anthropic AI, gives root access on MacOS — Claude Mythos helps
security
researchers bypass Memory Integrity Enforcement
🔐
Hardware Security
tomshardware.com
·
4d
·
Hacker News
,
r/technology
Highly critical -
SQL
injection
- SA-CORE-2026-004
🕳
LLM Vulnerabilities
drupal.org
·
10h
·
Hacker News
How We Hacked Our Way to Free 4.0s and Took Over a uWaterloo & UofT Grading Tool
🚀
Indie Hacking
xtra.sh
·
2d
·
Hacker News
Score by Collisions, Patch by Panic
🪝
eBPF
blog.himanshuanand.com
·
16h
·
Hacker News
The Thing Protecting You Is Now the Target
🛡️
AI Security
thetechvillain.substack.com
·
2d
·
Substack
First public macOS kernel memory corruption
exploit
on Apple M5
🕳
LLM Vulnerabilities
blog.calif.io
·
6d
·
Lobsters
,
Hacker News
,
r/ClaudeAI
,
r/apple
,
r/programming
,
r/singularity
Even Claude agrees: hole in its sandbox was real and dangerous
🎭
Claude
theregister.com
·
8h
·
Hacker News
Project Glasswing: what Mythos showed us (9 minute read)
🪄
Prompt Engineering
blog.cloudflare.com
·
2d
Linus Torvalds admits he has a 'love-hate relationship with AI'
🤖
AI
zdnet.com
·
9h
·
Hacker News
Vendor-Conditioned Contrastive Learning for Predicting Organizational
Cyber
Threat
Targets
🕵️
Threat Intelligence
arxiv.org
·
6d
Together, Edera and Minimus Claim They Can Protect Your Software From AI Hackers
🔐
Hardware Security
cloudnativenow.com
·
2d
·
Hacker News
gouravnagar-infosec/ai-kill-chain
: A defender-side extension of the Lockheed Martin
Cyber
Kill Chain for LLM and agentic AI
threats
. Adds a model supply chain stage and splits actions-on-objectives into exfiltration, model extraction, and agentic pivot.
🕵️
Threat Intelligence
github.com
·
22h
·
Hacker News
Huawei
zero-day
attack behind last year’s crash of Luxembourg's entire telecoms network
🎤
Chaos Communication Congress
therecord.media
·
1d
·
Hacker News
Microsoft Exchange:
Zero-day
vulnerability
is being attacked
🕳
LLM Vulnerabilities
heise.de
·
4d
·
Hacker News
zero-intelligence/zero-intel
: Every
codebase
has a confession. Most people never ask it the right question.
🚀
Indie Hacking
github.com
·
12h
·
Hacker News
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help