Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18269
posts in
685.7
ms
Mobile App Flaw Could
Expose
2FA
Codes on Smartphones
zimperium.com
Β·
4d
π‘
Cybersecurity
CodeShield
AI β Open-source security scanner (24% cheaper than
GitGuardian
)
lydiamorgan85.github.io
Β·
3d
Β·
Discuss:
Hacker News
π
Proof Carrying Code
Beyond
Roleplay
:
Jailbreaking
Gemini with drugs and ritual
tidepool.leaflet.pub
Β·
3d
Β·
Discuss:
Hacker News
πΌ
Cassette Hacking
Trust & Safety, built for whatβs next:
Musubi
x
Tremau
musubilabs.ai
Β·
4d
Β·
Discuss:
Hacker News
π΅οΈ
Vector Smuggling
Automated AI research setup (
Clawdbot/OpenClaw
and
vibecoding
)
jessesilverberg.com
Β·
3d
Β·
Discuss:
Hacker News
π‘
RSS Automation
LLM Data
Exfiltration
via URL Previews (With
OpenClaw
Example and Test)
promptarmor.com
Β·
4d
Β·
Discuss:
Hacker News
π‘οΈ
WASM Sandboxing
Sysadmin
In The LLM Age
nullrouted.space
Β·
3d
Β·
Discuss:
Lobsters
,
Hacker News
π©
Systems Programming
LookOut
: Discovering RCE and Internal Access on
Looker
(Google Cloud & On-Prem)
tenable.com
Β·
4d
π
eBPF
VS Code config files abused to launch
RCEs
via GitHub
Codespaces
scworld.com
Β·
3d
Β·
Discuss:
Hacker News
βοΈ
Nix Adoption
Microsoft engineer
speedruns
Raspberry Pi magic
smoke
in five minutes
theregister.com
Β·
4d
π
Single Board PC
Title: Just
patched
CVE-2026-21509
? Here's why you're still exposed
farathappsec.substack.com
Β·
6d
Β·
Discuss:
Substack
π
Homelab Pentesting
Persistent
Human Feedback, LLMs, and Static
Analyzers
for Secure Code Generation and Vulnerability Detection
arxiv.org
Β·
3d
π
Fuzzing
Hackers exploit
unsecured
MongoDB instances to wipe data and demand
ransom
securityaffairs.com
Β·
6d
π
BGP Security
Mobile Phishing
Kits
Evolve
to Sync with Voice Attacks
zimperium.com
Β·
3d
π«
Kerberos History
Causal Front-Door
Adjustment
for Robust
Jailbreak
Attacks on LLMs
arxiv.org
Β·
3d
π»
Local LLMs
How does
cyberthreat
attribution
help in practice?
kaspersky.com
Β·
6d
π¦
Malware Analysis
Oh Dear!
Notepad
++ Was Quietly
Compromised
for Six Months (But Don't Panic Just Yet)
itsfoss.com
Β·
5d
π
Terminal Forensics
Notepad
++
updater
was compromised for 6 months in supply-chain attack
arstechnica.com
Β·
6d
Β·
Discuss:
Hacker News
π£
ZIP Vulnerabilities
βI fell into itβ: ex-criminal hackers
urge
Manchester
pupils
to use web skills for good
theguardian.com
Β·
22h
Β·
Discuss:
Hacker News
π
Indie Hacking
Top 10 web
hacking
techniques
of 2025
portswigger.net
Β·
3d
π
BGP Security
Loading...
Loading more...
« Page 14
β’
Page 16 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help