Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cybersecurity
hacking, vulnerability, exploit, penetration testing, CTF
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186604
posts in
25.8
ms
The Complete 2025
Penetration
Testing & Ethical Hacking
Certification
Training Bundle (85% discount)
📐
System Design
sharewareonsale.com
·
4d
What’s new,
updated
, or
recently
released in Microsoft Security
🔭
Observability
microsoft.com
·
12h
OffSec
’s
Exploit
Database Archive
🔄
Data Pipelines
exploit-db.com
·
2d
When
paradigms
are shifting:
InfoSec
in the age of AI
🤖
AI Agents
insinuator.net
·
6h
IT Security Weekend
Catch
Up
🔭
Observability
badcyber.com
·
5d
Mythos
AI: What Actually Matters for
Cybersecurity
Leaders
🕸️
Distributed Systems
cisecurity.org
·
2d
Great
responsibility
, without great power
🕸️
Distributed Systems
blog.talosintelligence.com
·
10h
AI is the
present
of security
🤖
AI
webflow.sysdig.com
·
1d
Footprinting
and Scanning CTF Walkthrough: Reconnaissance Using
Nmap
& Web Enumeration
🔭
Observability
medium.com
·
16h
OSINT
Tools for Cybersecurity: A
Practical
Guide for Security Teams
🔭
Observability
socradar.io
·
6d
Full Disclosure: [
IWCC
2026] CfP: 15th International Workshop on Cyber Crime -
Linköping
, Sweden, Aug 24-27, 2026
☁️
Cloud Infra
seclists.org
·
1d
AI Auto
Exploiting
Vulnerabilities, GitHub
RCE
, Autonomous Cloud Hacking Agent
🤖
AI Agents
tldrsec.com
·
13h
Hacking Hotels via Smart
Stationary
Bikes: How
Unsecured
Gym Equipment Can Lead to RCE
📐
System Design
levelblue.com
·
1d
The
Rediscovered
Wheel: How a 2026 Cybersecurity Paper Dressed the
1960s
in a Lab Coat
🕸️
Distributed Systems
osintteam.blog
·
6d
Data
Centers
Confront
Rising Cyber and Physical Security Threats
🕸️
Distributed Systems
fdd.org
·
10h
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
🕸️
Distributed Systems
arxiv.org
·
1d
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
🛠️
Developer Tooling
github.com
·
12h
·
Hacker News
Safeguarding
Skies
: Airport Cybersecurity in the Digital Age
📐
System Design
arxiv.org
·
3d
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
☁️
Cloud Infra
snyk.io
·
1d
NSA
GRASSMARLIN
🔭
Observability
cisa.gov
·
2d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help