Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π΅οΈ Vector Smuggling
Embedding Exfiltration, Covert Channels, Data Hiding, ML Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28868
posts in
16.3
ms
Embeddings Arenβt Magic: The Geometry of How
Vectors
Encode
Meaning
hackernoon.com
Β·
8h
ποΈ
Vector Databases
digital
forensics
β
torrent
file analysis for windows!
medium.com
Β·
2h
π¬
Archive Forensics
Show HN: Break past
cryptography
in
seconds
stateofutopia.com
Β·
1d
Β·
Discuss:
Hacker News
π
Password Cracking
Machine Learning Threat
Roundup
hiddenlayer.com
Β·
1d
π¦
Malware Analysis
Risky
Bulletin
: LLMs can
deanonymize
internet users based on their past comments
news.risky.biz
Β·
1d
π
Hacking
I've Seen This IP: A Practical
Intersection
Attack Against
Tor
Introduction Circuits and Hidden Services
arxiv.org
Β·
23h
π£οΈ
BGP Hijacking
AI
Authentication
and
Authorization
fusionauth.io
Β·
2h
Β·
Discuss:
Hacker News
β‘
Proof Automation
Hackers
hijack
.arpa
domain for phishing scams β hosting malicious websites and domains where no one can spot them
techradar.com
Β·
5h
π
Hacking
Inception
Labs
says its diffusion LLM is 10x faster than Claude, ChatGPT, Gemini
thenewstack.io
Β·
7h
π₯οΈ
Terminal Renaissance
Ukrainian
hacker
pleads guilty to running
OnlyFake
AI ID scam site
securityaffairs.com
Β·
19h
π
Password Cracking
Visually secure
steganography
scheme for color images based on Trans-CS network, Cantor and
4D-TSCNN
sciencedirect.com
Β·
1d
π΅οΈ
Steganographic Compression
Exploring
the future of Artificial Intelligence β today's models,
tomorrow
's agents, and the big privacy problem
tomshardware.com
Β·
11h
π²
Cellular Automata
CyberStrikeAI
tool
adopted
by hackers for AI-powered attacks
bleepingcomputer.com
Β·
4h
β‘
Proof Automation
Insomni
'
hack
2026
ctftime.org
Β·
1d
π
Hacking
Fast
Biology
Bounties
nikomc.com
Β·
5h
Β·
Discuss:
Hacker News
π±
QR Archaeology
2328.io
Launches International Crypto
Payment
Infrastructure for Online Businesses
hackernoon.com
Β·
9h
π
Hash Chains
PDF:
PUF-based
DNN Fingerprinting for Knowledge Distillation
Traceability
arxiv.org
Β·
23h
π
Vector Forensics
Week 09
thisweekin4n6.com
Β·
1d
π£οΈ
BGP Hijacking
Why Service
Providers
Must Become Secure AI
Factories
paloaltonetworks.com
Β·
23h
π₯οΈ
Self-hosted Infrastructure
The
Banality
of
Artificial
Intelligence
tech.michaelaltfield.net
Β·
4h
π
Vector Forensics
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help