Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
181599
posts in
56.0
ms
Hacking
📼
Cassette Hacking
minitel.us
·
5d
Recent Microsoft
Defender
Vulnerability
Exploited
as Zero-Day
🎫
Kerberos Exploitation
securityweek.com
·
2d
Hackers Use Hidden Website
Instructions
in New Attacks on AI
Assistants
🕵️
Vector Smuggling
hackread.com
·
2d
New AI platforms hand
hackers
powerful new tools for
cracking
cybersecurity
🕵️
Vector Smuggling
chicago.suntimes.com
·
6d
Vercel
Finds More
Compromised
Accounts in Context.ai-Linked Breach
🕵️
Vector Smuggling
thehackernews.com
·
2d
The Cyber
Insecurity
List: Why Hackers Are
Logging
in, Not Breaking In
🛡
Cybersecurity
pymnts.com
·
5d
Top techniques
attackers
use to
infiltrate
your systems today
🎫
Kerberos Attacks
csoonline.com
·
4d
Ransomware negotiator cops to
conspiring
with
cybercrims
against US companies
🛡
Cybersecurity
metacurity.com
·
4d
Someone bought 30 WordPress plugins and
planted
a
backdoor
in all of them
🚀
Indie Hacking
news.ycombinator.com
·
5d
·
Hacker News
P-hacking
📼
Cassette Hacking
healthjournalism.org
·
4d
For the First Time in 15 Years, One Thing Is
Dominating
Cybersecurity
🛡
Cybersecurity
controld.com
·
6d
Zero-Day Reality:
Vulnerabilities
Exploited
on Day One
✅
Archive Fixity
youtube.com
·
3d
CVE-2023-33538 under attack for a year, but
exploitation
still
unsuccessful
🎫
Kerberos Exploitation
securityaffairs.com
·
5d
AI Hype vs. Reality: Is AI Really
Rewriting
the Vulnerability
Equation
?
🎯
Threat Hunting
malware.news
·
3d
OffSec
’s
Exploit
Database Archive
💣
ZIP Vulnerabilities
exploit-db.com
·
3d
Weaponizing
Apathy
: How Threat Actors Exploit Vulnerabilities and Legitimate Software
🎫
Kerberos Exploitation
cofense.com
·
3d
'The math is simple':
OpenClaw
'
Trojan
Horse' AI agents give hackers full control of 28,000+ systems
🎫
Kerberos Exploitation
techradar.com
·
3d
AI 'agent'
fever
comes with
lurking
security threats
🕵️
Vector Smuggling
techxplore.com
·
6d
How Unique Are
Mythos
's
Hacking
Capabilities?
🏺
Kerberos Archaeology
jonathanpgabor.substack.com
·
6d
·
Substack
Lovable
security crisis: 48 days of exposed projects, closed bug reports, & the
structural
failure of vibe coding security
🚀
Indie Hacking
thenextweb.com
·
4d
·
Hacker News
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help