Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔓 Hacking
computer security, crazy vulnerabilities
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17991
posts in
414.2
ms
It took a researcher fewer than 2 hours to
hijack
OpenClaw
thenewstack.io
·
3d
·
Discuss:
Hacker News
🎫
Kerberos Attacks
Nitrogen
ransomware programmers lock themselves out of a payment — key management bug
encrypts
victims' data forever
tomshardware.com
·
2d
🚀
Indie Hacking
Cyber-Espionage
Group
Breached
Systems in 37 Nations, Security Researchers Say
it.slashdot.org
·
1d
🕵️
Penetration Testing
The Myth of “Known APIs”: Why
Inventory-First
Security Models Are Already
Obsolete
lab.wallarm.com
·
3h
🔒
WASM Capabilities
The quiet revolution that made your home, car, and
wallet
a lot
safer
vox.com
·
1d
🔍
Cassette Forensics
Phantom Transfer: Data-level
Defences
are
Insufficient
Against Data Poisoning
arxiv.org
·
3d
🦠
Parasitic Storage
Tech support
chap
invented
fake fix for non-problem and watched it spread across the office
theregister.com
·
9h
🧪
Cassette Hacks
From Automation to Infection (Part II): Reverse Shells, Semantic Worms, and Cognitive
Rootkits
in
OpenClaw
Skills
blog.virustotal.com
·
4d
·
Discuss:
blog.virustotal.com
📟
Terminal Forensics
Webspace
Invaders
matthiasott.com
·
16h
·
Discuss:
Lobsters
,
Hacker News
🌐
WARC Forensics
Show HN: My "
Grandma
" prompt dropped a production
DB
. So I built a Kill Switch
news.ycombinator.com
·
1h
·
Discuss:
Hacker News
🧬
PostgreSQL Forensics
Russian-state hackers
exploit
Office vulnerability to
infect
computers
arstechnica.com
·
4d
·
Discuss:
r/technews
🎫
Kerberos Exploitation
Best
infosec-related
long
reads
for the week of 1/31/26
metacurity.com
·
2d
🛡
Cybersecurity
eBPF
Gives You
Packets
. Here's How We Turn Them Into Security Insights
akashmandal001.substack.com
·
8h
·
Discuss:
Substack
🛡️
eBPF Security
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humans’ Data
wired.com
·
2d
🎯
Threat Hunting
Analysis of active
exploitation
of
SolarWinds
Web Help Desk
microsoft.com
·
2d
🏺
Kerberos Archaeology
Critlist/protoHack
: Restoring Jay Fenlason's original 1981—1982 Hack to run on modern Linux.
github.com
·
1d
·
Discuss:
Hacker News
🎮
Game Decompilation
The
cybersecurity
mistakes
tech startups make, according to an expert
proton.me
·
4d
·
Discuss:
Hacker News
🛡
Cybersecurity
Liars
and
Outliers
schneier.com
·
19h
🔲
Cellular Automata
The Shadow Campaigns:
Uncovering
Global
Espionage
unit42.paloaltonetworks.com
·
4d
🎫
Kerberos Exploitation
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
·
21h
·
Discuss:
Hacker News
🔒
Secure Boot
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help