Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7520
posts in
127.5
ms
Spotting
and Handling Common Cybersecurity Threats in Everyday IT Work โ A Practical Guide from an IT
Technician
dev.to
ยท
5d
ยท
Discuss:
DEV
๐
Cybersecurity
Skill
Issues: An
OpenClaw
Malware Campaign
cantpwn.com
ยท
5d
ยท
Discuss:
Hacker News
๐ป
Tech
The
gentle
obsolescence
benn.substack.com
ยท
3d
ยท
Discuss:
Substack
โ๏ธ
Prompt Engineering
Popular text editor
Notepad
++ was
hacked
to drop malware
itnews.com.au
ยท
6d
ยท
Discuss:
Hacker News
๐ ๏ธ
Developer Tools
Executive Function as Code: using (
Doom
)
Emacs
to script my brain
milly.kittycloud.eu
ยท
4d
ยท
Discuss:
Hacker News
,
r/selfhosted
๐ ๏ธ
Developer Tools
I hacked my own computer using
OpenClaw
and it was
terrifyingly
easy
androidauthority.com
ยท
6d
ยท
Discuss:
Hacker News
๐ค
AI
Breaking the Stack: How Adversarial Attacks
Bypass
LLM
Safeguards
pub.towardsai.net
ยท
5d
โก
LLM Optimization
Trusting
Claude With a Knife: Unauthorized Prompt Injection to
RCE
in Anthropicโs Claude Code Action
johnstawinski.com
ยท
4d
ยท
Discuss:
Hacker News
โ๏ธ
Prompt Engineering
I Built a 6
BIPS
JIT
in Five Months
unlikelyemphasis.substack.com
ยท
3d
ยท
Discuss:
Substack
โ๏ธ
Prompt Engineering
OpenClaw
security vulnerabilities include data leakage and prompt
injections
giskard.ai
ยท
5d
ยท
Discuss:
Hacker News
,
r/LocalLLaMA
๐
Cybersecurity
Adaptive
Hashing
: Faster Hash Functions with Fewer
Collisions
arxiv.org
ยท
3d
ยท
Discuss:
Hacker News
โก
Model Efficiency
Sidestepping
Evaluation Awareness and
Anticipating
Misalignment with Production Evaluations
alignment.openai.com
ยท
4d
ยท
Discuss:
Hacker News
๐
AI Interpretability
Malicious Script Delivering More
Maliciousness
, (
Wed
, Feb 4th)
isc.sans.edu
ยท
5d
๐
Cybersecurity
The โฌ10
Mirror
: Why Enterprise Security Looks Like a
Kid
โs Toy
labs.itresit.es
ยท
5d
ยท
Discuss:
Hacker News
๐
Cybersecurity
The
Null
Pointer
Crisis: Running God-Mode Software on Legacy Hardware
news.ycombinator.com
ยท
4d
ยท
Discuss:
Hacker News
๐๏ธ
SQLite
Honest
and
Elitist
Thoughts on Why Computers Were More Fun Before
datagubbe.se
ยท
3d
ยท
Discuss:
Hacker News
๐
Entertainment
toborrm9/malicious
_extension_
sentry
: Malicious Extension Database
github.com
ยท
3d
ยท
Discuss:
Hacker News
๐
Databases
Hallucination-Resistant
Security Planning with a Large Language Model
arxiv.org
ยท
3d
โก
LLM Optimization
Stephenson
impersonator
; minor update
nealstephenson.substack.com
ยท
4d
ยท
Discuss:
Substack
โ๏ธ
Prompt Engineering
Data breach at
govtech
giant
Conduent
balloons, affecting millions more Americans
techcrunch.com
ยท
4d
๐
Cybersecurity
Loading...
Loading more...
« Page 6
โข
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help