Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24429
posts in
17.6
ms
The Good, the Bad and the
Ugly
in
Cybersecurity
🛡
Cybersecurity
sentinelone.com
·
5d
·
…
Hackers exploit
TrueConf
zero-day to push
malicious
software updates
🎫
Kerberos Attacks
bleepingcomputer.com
·
13h
·
…
When
Trusted
Software Updates Become the Attack Vector: Inside Operation
TrueChaos
and a New Zero Day Vulnerability in a Popular Collaboration Tool
🛡️
CLI Security
blog.checkpoint.com
·
1d
·
…
Critical ATO to
P5
‘
Informational
’: A Lesson in Threat Models & Bug Bounty Reality
🧪
Protocol Fuzzing
infosecwriteups.com
·
2d
·
…
'Each vulnerability exposes a different class of enterprise data':
LangChain
framework hit by several
worrying
security issues
💣
ZIP Vulnerabilities
techradar.com
·
5d
·
…
Between Two
Nerds
: More
secure
but less safe
🔐
Capability Security
risky.biz
·
2d
·
…
Affected
by This
LastPass
Breach? How to Get a Cut of the $24.5M Settlement
🏺
Kerberos Archaeology
pcmag.com
·
2d
·
Hacker News
·
…
Mass
Exploitation
2.0: When One
Vulnerability
Becomes Everyone’s Problem
🛡
Cybersecurity
lmgsecurity.com
·
6d
·
…
How We Hacked
BCG
's Data Warehouse — 3.17 Trillion
Rows
, Zero Authentication
🧬
PostgreSQL Forensics
codewall.ai
·
1d
·
Hacker News
·
…
Coruna
exploit reveals evolution of
Triangulation
iOS exploitation framework
🔓
Password Cracking
securityaffairs.com
·
6d
·
…
Operation
TrueChaos
: 0-Day
Exploitation
Against Southeast Asian Government Targets
🛡️
eBPF Security
research.checkpoint.com
·
1d
·
…
DBXen
Exploit
Analysis
🎫
Kerberos Attacks
blog.verichains.io
·
6d
·
…
Hacker's AI: The
Messy
Reality of
Weaponized
AI
🕵️
Vector Smuggling
hackernoon.com
·
6d
·
…
How I
Attacked
Active Directory During
OSCP
Labs (And What Tools Actually Worked)
🏢
Active Directory
infosecwriteups.com
·
2d
·
…
'Not just development tools': Security experts discover critical
flaw
in OpenAI's Codex which could
compromise
entire enterprise organizations
🏠
Homelab Pentesting
techradar.com
·
1d
·
…
Hackers now
exploit
critical
F5
BIG-IP flaw in attacks, patch now
🎫
Kerberos Exploitation
bleepingcomputer.com
·
3d
·
Hacker News
·
…
U.S.
CISA
adds a flaw in
F5
BIG-IP AMP to its Known Exploited Vulnerabilities catalog
🛡
Cybersecurity
securityaffairs.com
·
5d
·
…
VulnCorp
CTF by
INE
: The Moment I Wanted to Quit, But I Didn’t
🌐
DNS Security
infosecwriteups.com
·
3d
·
…
U.S.
CISA
adds a
Langflow
flaw to its Known Exploited Vulnerabilities catalog
🛡
Cybersecurity
securityaffairs.com
·
6d
·
…
Critical Fortinet
Forticlient
EMS
flaw now exploited in attacks
🌐
DNS Security
bleepingcomputer.com
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help