Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π΅οΈ Vector Smuggling
Embedding Exfiltration, Covert Channels, Data Hiding, ML Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19396
posts in
328.0
ms
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
Β·
1d
Β·
Discuss:
Hacker News
π§ͺ
Binary Fuzzing
Convolutional
Neural Networks using
Logarithmic
Data Representation
dev.to
Β·
1h
Β·
Discuss:
DEV
π§
Machine Learning
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
Β·
23h
π
Cultural Algorithms
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
Β·
21h
π
Hacking
Clouding
the Mirror:
Stealthy
Prompt Injection Attacks Targeting LLM-based Phishing Detection
arxiv.org
Β·
2d
π
LDAP Injection
Going Through
Snowden
Documents
, Part 1
libroot.org
Β·
11h
Β·
Discuss:
Lobsters
π
Terminal Forensics
Human-like Search for Modern
Applications
anvitra.ai
Β·
4h
Β·
Discuss:
Hacker News
ποΈ
Vector Search
December 2025βJanuary 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
Β·
2d
π¦
Malware Analysis
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
Β·
12h
Β·
Discuss:
Hacker News
π§
Digital Watermarking
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
Β·
1d
Β·
Discuss:
Hacker News
,
r/programming
π§ͺ
Binary Fuzzing
Your AI Agent Will
Betray
You (Unless You Build It These
Guardrails
)
dev.to
Β·
20h
Β·
Discuss:
DEV
π―
Threat Hunting
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humansβ Data
wired.com
Β·
19h
π
Hacking
DCP-o-matic β’ Re: How do I generate a
VF
using an encrypted
OV
DCP?
dcpomatic.com
Β·
12h
π
Archive Encryption
The silent DNS malware thatβs
redefining
email and web-based
cyberattacks
techradar.com
Β·
1d
π
DNS Security
Neural Bitcoin Small Class
Number
Attack
leetarxiv.substack.com
Β·
3d
Β·
Discuss:
Substack
π’
Bitwise Algorithms
When Clever Hardware Hacks Bite Back: A Password
Keeper
Device
Autopsy
hackaday.com
Β·
7h
π
Hacking
On The
Crank
Spectrum
exple.tive.org
Β·
1d
π₯οΈ
Terminal Renaissance
AI and the
Reconfiguration
of the
Counterintelligence
Battlefield
tandfonline.com
Β·
3d
π
Vector Forensics
OpenAI Explains URL-Based Data
Exfiltration
Mitigations
in New Paper
embracethered.com
Β·
3d
π
DNS Security
Semantic-level
Backdoor
Attack against Text-to-Image Diffusion Models
arxiv.org
Β·
2d
ποΈ
Perceptual Hashing
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help