Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Vector Smuggling
Embedding Exfiltration, Covert Channels, Data Hiding, ML Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
19457
posts in
379.7
ms
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
20h
·
Discuss:
Hacker News
🧪
Binary Fuzzing
Semantic-level
Backdoor
Attack against Text-to-Image Diffusion Models
arxiv.org
·
1d
👁️
Perceptual Hashing
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
13h
🌍
Cultural Algorithms
Your AI Agent Will
Betray
You (Unless You Build It These
Guardrails
)
dev.to
·
10h
·
Discuss:
DEV
🎯
Threat Hunting
Going Through
Snowden
Documents
, Part 1
libroot.org
·
2h
·
Discuss:
Lobsters
📟
Terminal Forensics
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
11h
🔓
Hacking
AI
Watermark
&
Stego
Scanner (Text + Code)
ulrischa.github.io
·
3h
·
Discuss:
Hacker News
💧
Digital Watermarking
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
1d
🦠
Malware Analysis
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
1d
·
Discuss:
Hacker News
,
r/programming
🧪
Binary Fuzzing
Neural Bitcoin Small Class
Number
Attack
leetarxiv.substack.com
·
3d
·
Discuss:
Substack
🔢
Bitwise Algorithms
Moltbook
, the Social Network for AI Agents,
Exposed
Real Humans’ Data
wired.com
·
10h
🔓
Hacking
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
1d
🌐
DNS Security
DCP-o-matic • Re: How do I generate a
VF
using an encrypted
OV
DCP?
dcpomatic.com
·
3h
🔐
Archive Encryption
On The
Crank
Spectrum
exple.tive.org
·
21h
🖥️
Terminal Renaissance
AI and the
Reconfiguration
of the
Counterintelligence
Battlefield
tandfonline.com
·
3d
🔍
Vector Forensics
OpenAI Explains URL-Based Data
Exfiltration
Mitigations
in New Paper
embracethered.com
·
2d
🌐
DNS Security
Using AI Agents to
Analyze
Malware on
REMnux
zeltser.com
·
21h
🦠
Malware Analysis
Private Data Space Model
privatedata.space
·
2d
✅
Format Verification
Android
RAT
Hidden in AI Framework
Hosts
Raises Mobile Threat Risks
zimperium.com
·
1d
🌐
DNS over QUIC
The
Beacon
is
lit
blog.zarfhome.com
·
6h
⚡
Homebrew CPUs
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help