Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔬 Security Research
vulnerability research, CVE, zero-day, bug bounty
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187260
posts in
34.3
ms
NEWS
ROUNDUP
🔍
Digital Forensics
digitalforensicsmagazine.com
·
2d
CISA
Adds 4 Exploited Flaws to
KEV
, Sets May 2026 Federal Deadline
💥
Cyber Attacks
thehackernews.com
·
5d
Claude Code, Copilot and Codex all got hacked. Every
attacker
went for the
credential
, not the model.
🔓
Penetration Testing
venturebeat.com
·
10h
CVE-2026-3854
💥
Cyber Attacks
nvd.nist.gov
·
1d
·
Hacker News
AI Auto
Exploiting
Vulnerabilities, GitHub
RCE
, Autonomous Cloud Hacking Agent
💥
Exploit Development
tldrsec.com
·
12h
MAS-SZZ
: Multi-Agentic
SZZ
Algorithm for
Vulnerability-Inducing
Commit Identification
💥
Exploit Development
arxiv.org
·
2d
Security Software: Holding the
Vault
Door Open for
Criminals
💥
Exploit Development
jericho.blog
·
3d
Windows Zero‑Day Vulnerability Enables
NTLM
Credential
Theft
🔧
Hardware Hacking
petri.com
·
14h
Copy Fail: This
Exploit
Gives
Root
Access on Linux
⚙️
Binary Exploitation
youtube.com
·
48m
OffSec
’s
Exploit
Database Archive
💥
Exploit Development
exploit-db.com
·
2d
Remote Code Execution in GitHub Enterprise Server via
Git
Push Injection (
CVE-2026-3854
)
💥
Exploit Development
orca.security
·
8h
Risky Bulletin: New
fingerprinting
technique can track
Tor
users
💥
Cyberattack
news.risky.biz
·
4d
CVE-2026-31431: “Copy Fail” Linux kernel
flaw
lets local users gain
root
in seconds
⚙️
Binary Exploitation
webflow.sysdig.com
·
1d
Vulnerable
AI
Lab
🕵️
Threat Intelligence
infosecwriteups.com
·
22h
Full Disclosure:
Trojan-Spy.Win32.Small
🦠
Malware Analysis
seclists.org
·
1d
Anthropic’s Powerful New Cybersecurity Tool Is
Designed
to Find
Vulnerabilities
in Your Code—and Patch Them
💥
Exploit Development
inc.com
·
8h
Why a Decade of Writing Detection Logic Makes the
Mythos
Exploit Numbers Less
Scary
🕵️
Threat Intelligence
magonia.io
·
3d
·
r/netsec
Henrietta
Dombrovskaya
: PG DATA 2026. The talks I am most excited about. Part 2
🔐
Cryptography
hdombrovskaya.wordpress.com
·
1h
Critical
cPanel
CRLF
injection vulnerability puts tens of millions of websites at risk of total compromise – hosting providers urged to apply CVE-2026-41940 patch immediately
📡
Network Security
techradar.com
·
11h
NIST
’s
NVD
Changes: A Wake-Up Call for CVE-Driven Security
💥
Cyber Attacks
oligo.security
·
2d
·
Hacker News
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help