Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18418
posts in
208.8
ms
OSINT-How
Public Information
Becomes
Powerful Intelligence
medium.com
·
3d
🔎
OSINT Techniques
Five
Predictions
for
Cyber
Security Trends in 2026
heimdalsecurity.com
·
5d
🛡
Cybersecurity
Critical flaws in
Ivanti
EPMM
lead to fast-moving exploitation attempts
cybersecuritydive.com
·
6d
🛡️
RISC-V Security
Cyber Risk in 2026: From Today's
Pressures
to
Tomorrow
's Threats
bitsight.com
·
5d
🎯
Threat Hunting
Notepad
++ says it was
hijacked
by Chinese state-sponsored hackers
engadget.com
·
6d
🚀
Indie Hacking
OpenClaw
’s AI ‘skill’
extensions
are a security nightmare
theverge.com
·
5d
⚡
Proof Automation
A handful of
wholesomely
bad ads for 90s
SPARC
clones
buttondown.com
·
3d
·
Discuss:
Hacker News
🕹️
Retro Gaming
AI agents could change your life — if they don’t
ruin
it first
vox.com
·
4d
🚀
Indie Hacking
[
OFF-MENU
] The Software Engineer's AI
Apocalypse
Survival Guide
pizzaexperiments.com
·
3d
·
Discuss:
Hacker News
⚙️
Proof Engineering
Virtual
Insanity
: The Moving
Floor
dev.to
·
3d
·
Discuss:
DEV
🖥️
Terminal Renaissance
Moltbot
is now
OpenClaw
- but watch out, malicious 'skills' are still trying to trick victims into spreading malware
techradar.com
·
5d
🦠
Malware Analysis
More than 40,000 WordPress sites
affected
by new malware
flaw
- find out if you're
affected
techradar.com
·
5d
🛡
Cybersecurity
The
Recent
0-Days in
Node.js
and React Were Found by an AI
winfunc.com
·
6d
·
Discuss:
Hacker News
,
r/programming
🧪
CBOR Fuzzing
China-linked
Amaranth-Dragon
hackers target Southeast Asian
governments
in 2025
securityaffairs.com
·
4d
🎫
Kerberos Exploitation
The rise of
Moltbook
suggests viral AI
prompts
may be the next big security threat
arstechnica.com
·
6d
💿
WORM Storage
What Is a
Brute
Force Attack and How to
Prevent
It
securityscorecard.com
·
5d
🔓
Password Cracking
Moltbook
101: How to Build and
Secure
Your First AI Agent in the "Agent Social Network"
dev.to
·
2d
·
Discuss:
DEV
⚔️
Lean Tactics
Notepad
++
hack
marks an evolution of supply chain threats
reversinglabs.com
·
4d
💣
ZIP Vulnerabilities
Why Smart People Fall For
Phishing
Attacks
unit42.paloaltonetworks.com
·
5d
🎯
Threat Hunting
Broken
Phishing
URLs
, (Thu, Feb 5th)
isc.sans.edu
·
4d
🛣️
BGP Hijacking
Loading...
Loading more...
« Page 11
•
Page 13 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help