Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎭 Social Engineering
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
121983
posts in
2.11
s
Welcome to the
Twilight
Zone of the
Zombie
Internet
evanforry.com
·
7h
⚡
NATS
A
note
about personal security
werd.io
·
1d
·
Discuss:
Hacker News
☁
Cloud Infrastructure
Archive.today:
Operator
uses users for
DDoS
attack
heise.de
·
1d
·
Discuss:
Hacker News
📜
JavaScript
Past Automation and Future A.I.: How
Weak
Links
Tame
the Growth Explosion [pdf]
web.stanford.edu
·
1h
·
Discuss:
Hacker News
⚡
NATS
Say this instead of ‘
please
find
attached
’
fastcompany.com
·
4h
⚡
NATS
Fake AI Chrome extensions with
300K
users steal
credentials
, emails
bleepingcomputer.com
·
9h
☁
Cloud Infrastructure
SSHStalker
Botnet Uses IRC
C2
to Control Linux Systems via Legacy Kernel Exploits
thehackernews.com
·
1d
☁
Cloud Infrastructure
I let Claude Code with 150 offensive security MCP tools
loose
on my
homelab
credrelay.com
·
1d
·
Discuss:
Hacker News
🤖
AI
When Security
Becomes
an
Afterthought
paloaltonetworks.com
·
9h
☁
Cloud Infrastructure
I was
insulted
today
forkingmad.blog
·
6h
·
Discuss:
Hacker News
⚡
NATS
Employee Monitoring and
SimpleHelp
Software
Abused
in Ransomware Operations
huntress.com
·
1d
·
Discuss:
Hacker News
,
Hacker News
☁
Cloud Infrastructure
Who’s the agent now?
danturkel.com
·
1d
·
Discuss:
Hacker News
🤖
AI
How To
Hack
Part 3
infosecwriteups.com
·
1d
🤖
AI
Attackers
prompted
Gemini over 100,000 times while trying to clone it, Google says
arstechnica.com
·
3h
🤖
AI
Social Media and the “
Whiggish
” Historical Worldview: Force
Multipliers
of Ignorance & Inaction
playingatlife.com
·
16h
·
Discuss:
r/TrueReddit
⚡
NATS
Are
ads
the only way to scale AI to
mainstream
users?
nanonets.com
·
1d
·
Discuss:
Hacker News
🤖
AI
Technical Advisory:
OpenClaw
Exploitation
in Enterprise Networks
bitdefender.com
·
9h
⚡
NATS
The game is over: when “free” comes at too high a price. What we know about
RenEngine
securelist.com
·
1d
🎨
API Design
Just-in-Time
Ontological
Reframing
: Teaching Gemini to Route Around Its Own Safety Infrastructure
recursion.wtf
·
3d
⚡
NATS
LummaStealer
activity
spikes
post-law enforcement disruption
securityaffairs.com
·
8h
⚡
NATS
Loading...
Loading more...
« Page 4
•
Page 6 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help