Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Vector Smuggling
Embedding Exfiltration, Covert Channels, Data Hiding, ML Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19487
posts in
161.8
ms
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
8h
·
Discuss:
Hacker News
🧪
Binary Fuzzing
Semantic-level
Backdoor
Attack against Text-to-Image Diffusion Models
arxiv.org
·
1d
👁️
Perceptual Hashing
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
1h
🌍
Cultural Algorithms
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
18h
🌐
DNS Security
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
21h
·
Discuss:
Hacker News
,
r/programming
🧪
Binary Fuzzing
**Title**
dev.to
·
3h
·
Discuss:
DEV
👁️
Perceptual Hashing
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
1d
🦠
Malware Analysis
Neural Bitcoin Small Class
Number
Attack
leetarxiv.substack.com
·
2d
·
Discuss:
Substack
🔢
Bitwise Algorithms
On The
Crank
Spectrum
exple.tive.org
·
9h
🖥️
Terminal Renaissance
AI and the
Reconfiguration
of the
Counterintelligence
Battlefield
tandfonline.com
·
2d
🔍
Vector Forensics
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
Android
RAT
Hidden in AI Framework
Hosts
Raises Mobile Threat Risks
zimperium.com
·
19h
🌐
DNS over QUIC
Operant
AI targets ‘
shadow
’ AI agents with real-time security platform
thenewstack.io
·
15h
🎯
Threat Hunting
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
1d
🔓
Hacking
OpenAI Explains URL-Based Data
Exfiltration
Mitigations
in New Paper
embracethered.com
·
2d
🌐
DNS Security
Prompt
injection
attacks in the wild
blog.fsck.com
·
2d
🎯
Threat Hunting
Three clues that your LLM may be
poisoned
with a
sleeper-agent
back door
theregister.com
·
2d
🎯
Threat Hunting
a
proposal
for AI that's on your side
r.github.io
·
15h
·
Discuss:
Hacker News
🤖
AI Curation
Clouding
the Mirror:
Stealthy
Prompt Injection Attacks Targeting LLM-based Phishing Detection
arxiv.org
·
1d
🔓
LDAP Injection
Risky
Bulletin: Denmark
recruits
hackers for offensive cyber operations
news.risky.biz
·
1d
🛡
Cybersecurity
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help