Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19405
posts in
392.7
ms
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
·
4h
🔓
Password Cracking
A
Horrible
Conclusion
addisoncrump.info
·
15h
·
Discuss:
Lobsters
,
Hacker News
🐛
Fuzzing
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
2d
🚀
Indie Hacking
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
18h
🎯
Threat Hunting
Risky
Bulletin: Denmark
recruits
hackers for offensive cyber operations
news.risky.biz
·
2d
🛡
Cybersecurity
It took a researcher fewer than 2 hours to
hijack
OpenClaw
thenewstack.io
·
2d
·
Discuss:
Hacker News
🎫
Kerberos Attacks
OpenClaw
’s Security
Nightmare
: Lessons in Agentic Engineering Era
dev.to
·
12h
·
Discuss:
DEV
🌳
Archive Merkle Trees
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
2d
🛡
Cybersecurity
Hacker
claims theft of data from 700,000
Substack
users; Company confirms breach
securityaffairs.com
·
2d
🛡
Cybersecurity
Nitrogen
ransomware programmers lock themselves out of a payment — key management bug
encrypts
victims' data forever
tomshardware.com
·
16h
🚀
Indie Hacking
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
3d
·
Discuss:
blog.virustotal.com
📟
Terminal Forensics
CISA orders federal agencies to rip out
EOL
edge kit before
cybercrooks
move in
theregister.com
·
1d
🛡
Cybersecurity
Phantom Transfer: Data-level
Defences
are
Insufficient
Against Data Poisoning
arxiv.org
·
1d
🦠
Parasitic Storage
Critlist/protoHack
: Restoring Jay Fenlason's original 1981—1982 Hack to run on modern Linux.
github.com
·
5h
·
Discuss:
Hacker News
🎮
Game Decompilation
Open the wrong “PDF” and
attackers
gain
remote access to your PC
malwarebytes.com
·
2d
💣
ZIP Vulnerabilities
Russian-state hackers
exploit
Office vulnerability to
infect
computers
arstechnica.com
·
3d
·
Discuss:
r/technews
🎫
Kerberos Exploitation
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
NTLM Forensics
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humans’ Data
wired.com
·
16h
🎯
Threat Hunting
Best
infosec-related
long
reads
for the week of 1/31/26
metacurity.com
·
15h
🛡
Cybersecurity
A New Era for Security? Anthropic's Claude
Opus
4.6 Found 500
High-Severity
Vulnerabilities
it.slashdot.org
·
1h
🔐
Capability Systems
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help