Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕵️ Vector Smuggling
Embedding Exfiltration, Covert Channels, Data Hiding, ML Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28208
posts in
16.7
ms
Week 09
thisweekin4n6.com
·
4h
🛣️
BGP Hijacking
A Decision-Theoretic
Formalisation
of
Steganography
With Applications to LLM Monitoring
arxiv.org
·
2d
🦠
Parasitic Archives
Teenage
hackers
are on the rise, and they’re more dangerous than you think
fastcompany.com
·
4h
🔓
Hacking
JamesEBall/agentic-ml-lab
: Claude Code-native agentic
ML
research lab framework
github.com
·
15h
·
Discuss:
Hacker News
⚔️
Lean Tactics
AI can link fake online names to real
identities
in minutes for just a few
dollars
the-decoder.com
·
2h
🔍
BitFunnel
Byte-Pair
Encoding
en.wikipedia.org
·
5h
·
Discuss:
Hacker News
📝
Text Compression
Area Man Accidentally
Hacks
6,700 Camera-Enabled Robot
Vacuums
wired.com
·
1d
🔓
Hacking
Unsupervised
Learning NO. 518
newsletter.danielmiessler.com
·
23h
🔍
Vector Forensics
There's no such thing as '
military-grade
encryption
'
techradar.com
·
1d
🔐
Archive Cryptanalysis
APT37
hackers use new malware to breach
air-gapped
networks
bleepingcomputer.com
·
1d
🔓
Hacking
How Researchers
Measure
, Detect and Benchmark AI
Manipulation
hackernoon.com
·
21h
🔍
Vector Forensics
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 86
securityaffairs.com
·
3h
🦠
Malware Analysis
PirateBox
(EN)
codingnews.info
·
8h
🏴☠️
Piracy
Google
Quantum-Proofs
HTTPS
tech.slashdot.org
·
1d
🔐
Quantum Security
Linkage
11011110.github.io
·
19h
🕳️
Persistent Homology
Show HN: Adversarial AI agents that debate and
verify
travel
itineraries
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
⚡
Proof Automation
Suspected
Nork
digital
intruders
caught breaking into US healthcare, education orgs
theregister.com
·
1d
🔓
Hacking
Python Virtual
Environment
blog.raymond.burkholder.net
·
18h
⚙️
WASM Runtime
When LoRA
Betrays
:
Backdooring
Text-to-Image Models by Masquerading as Benign Adapters
arxiv.org
·
3d
💻
Local LLMs
Covert
Channels:
Obfuscation
Vectors, Evasion and Resistance Techniques for SSH Traffic
blogs.tunelko.com
·
5d
🌐
NetworkProtocols
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help