Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Cybersecurity
vulnerabilities, CVE, infosec, hacking, exploits
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
13087
posts in
17.3
ms
I
audited
a
Vibe-Coded
SaaS and found 5 critical vulnerabilities in 5 minutes.
🔌
Embedded Systems
ubserve.com
·
4d
·
DEV
ThreatsDay
Bulletin: SMS Blaster Busts,
OpenEMR
Flaws, 600K Roblox Hacks and 25 More Stories
🔌
Embedded Systems
thehackernews.com
·
11h
Claude
Mythos
: The 27-Year Bug That Should
Terrify
You
✍️
Prompt Engineering
youtu.be
·
6d
·
DEV
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
🔌
Embedded Systems
github.com
·
9h
·
Hacker News
AISLE
Discovers 38
CVEs
in Healthcare Software Used by 100,000 Medical Providers
🔌
Embedded Systems
aisle.com
·
2d
·
Hacker News
VLAN
Segmentation:
Securing
IoT Devices from the Main Network
🔌
Embedded Systems
valtersit.com
·
6d
·
DEV
Software
💻
Command Line Tools
news.ycombinator.com
·
3d
·
Hacker News
Introducing
Advanced
Account
Security
🗄️
Database Internals
openai.com
·
1d
How
attackers
hijack
LLM agents
📋
Formal Methods
dev.to
·
12h
·
DEV
SecMate
: Multi-Agent Adaptive Cybersecurity Troubleshooting with Tri-Context
Personalization
🤖
Agentic AI
arxiv.org
·
21h
CloudFormation
in Production: What
Breaks
and How to Fix It
☁️
Cloud Computing
leonardkachi.click
·
3d
·
DEV
RaccoonLine
Report: Independent Ranking of Top 5 Decentralized
VPNs
in 2026
🔌
Embedded Systems
hackernoon.com
·
2d
Private
CISO
for solo founders and AI
builders
🔌
Embedded Systems
goingsecure.dev
·
4d
·
Hacker News
Security Copilot Agents in
Defender
XDR
: where things actually stand
🔌
Embedded Systems
techcommunity.microsoft.com
·
5d
Bug
Bounty
Guide –
Methodology
, AI tools, and lessons from 4 years of hunting
🔌
Embedded Systems
aituglo.com
·
3d
·
Hacker News
RSME
: A Reactive Stability
Mutation
Encryption Algorithm for Active Defense and Lightweight Cybersecurity
🔌
Embedded Systems
zenodo.org
·
4d
·
Hacker News
,
Hacker News
pleasedodisturb/llm-safe-haven
: The missing security guide for solo developers running autonomous AI coding agents
🕵️
AI Agents
github.com
·
9h
·
Hacker News
CISA Adds Actively Exploited
ConnectWise
and Windows Flaws to
KEV
🔌
Embedded Systems
thehackernews.com
·
1d
When AI
Codes
for
Hackers
🕵️
AI Agents
dev.to
·
14h
·
DEV
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
🔌
Embedded Systems
arxiv.org
·
21h
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help