Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cybersecurity
infosec, vulnerabilities, exploits, hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3924
posts in
22.3
ms
GDPR/CCPA
scanner, breach SIM,
remediation
💾
Data Breaches
apollo.aiia-tech.com
·
1d
·
Hacker News
Cybersec
is a
thankless
job: expanding workload and shrinking pay packet
💾
Data Breaches
theregister.com
·
3d
·
Hacker News
pwnwriter/seg
: Analyze binaries and generate structured reports for AI agents and security research.
💾
Low-Level Code
github.com
·
5h
·
Hacker News
CVE-2026-3854
💾
Data Breaches
nvd.nist.gov
·
22h
·
Hacker News
Finding
Vulnerabilities
with
Warden
🛠️
Software Craft
cra.mr
·
2d
·
Hacker News
Nccdc
2026: Same Game, New
Dimensions
🛠️
Software Craft
alexlevinson.wordpress.com
·
6h
·
Hacker News
oss-security - Re: CVE-2026-31431:
CopyFail
: linux local privilege
scalation
🌱
Open Source
openwall.com
·
5h
·
Hacker News
Constantine
:
Locates
Fatal Security Bugs in Software
🛠️
Compilers
docs.praetorian.com
·
3d
·
Hacker News
Clasp
: A four-stage supply-chain attack pattern via emergency
patches
💾
Data Breaches
clasp.info
·
2d
·
Hacker News
Mapping
the U.S. Federal Government
Ecosystem
for Cybersecurity, Privacy, and Trust
⚖️
Digital Rights
strategyofsecurity.com
·
50m
·
Hacker News
EXPMON
detected sophisticated zero-day
fingerprinting
attack targeting Adobe Reader users
💾
Data Breaches
justhaifei1.blogspot.com
·
7h
·
Hacker News
Critical
cPanel
and
WHM
bug exploited as a zero-day, PoC now available
💾
Data Breaches
bleepingcomputer.com
·
10h
·
Hacker News
What Anthropic’s
Mythos
Means for the Future of
Cybersecurity
💾
Data Breaches
schneier.com
·
2d
·
Hacker News
How Big a Threat Are
Iranian-Backed
Cyberattacks
?
💾
Data Breaches
newyorker.com
·
6d
·
Hacker News
IP Ninja :: Fake PoC, Real Backdoor: How a
Typosquatted
Repo
Weaponized
CVE-2026-31431
🔍
Reverse Engineering
ip-ninja.com
·
12h
·
Hacker News
Attack of the killer
script
kiddies
💾
Data Breaches
theverge.com
·
2d
·
Hacker News
Claude Security
enters
public
beta
💾
Data Breaches
claude.com
·
2h
·
Hacker News
Behavioral
security for AI agents, OS-level
interception
🧠
Edge AI
quintai.dev
·
21h
·
Hacker News
High
Vulnerability
in the Linux Kernel ("
Copy
Fail")
💾
Low-Level Code
cert.europa.eu
·
4h
·
Hacker News
A
glimpse
into
cyber-security
’s AI-driven future
🧠
Edge AI
economist.com
·
1d
·
Hacker News
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help