Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cybersecurity
infosec, vulnerabilities, exploits, hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3916
posts in
14.0
ms
IP Ninja :: Fake PoC, Real Backdoor: How a
Typosquatted
Repo
Weaponized
CVE-2026-31431
🔍
Reverse Engineering
ip-ninja.com
·
15h
·
Hacker News
The Internet Is Falling Down, Falling Down, Falling Down (
cPanel
&
WHM
Authentication Bypass CVE-2026-41940)
📡
ESP32
labs.watchtowr.com
·
1d
·
Hacker News
,
r/netsec
What is a
passkey
, how does it work and why is it better than a
password
?
💾
Data Breaches
theguardian.com
·
6d
·
Hacker News
Introducing
Arcjet
Guards
: security inside the agent loop
🧠
Edge AI
blog.arcjet.com
·
11h
·
Hacker News
Inside a 14-month responsible disclosure with the
RIPE
NCC
💾
Data Breaches
mxsasha.eu
·
1d
·
Hacker News
High
Vulnerability
in the Linux Kernel ("
Copy
Fail")
💾
Low-Level Code
cert.europa.eu
·
7h
·
Hacker News
GitHub
RCE
Vulnerability: CVE-2026-3854
Breakdown
🛠️
Software Craft
wiz.io
·
2d
·
Lobsters
,
Hacker News
,
r/programming
,
r/webdev
Software
🛠️
Software Craft
news.ycombinator.com
·
3d
·
Hacker News
NIST
’s
NVD
Changes: A Wake-Up Call for CVE-Driven Security
🔍
Reverse Engineering
oligo.security
·
2d
·
Hacker News
Bug
Bounty
Guide –
Methodology
, AI tools, and lessons from 4 years of hunting
🛠️
Software Craft
aituglo.com
·
3d
·
Hacker News
MeshCore
's Problem with Security
💾
Low-Level Code
alainx277.com
·
2d
·
Hacker News
Patch Your Kernel NOW: 732byte Python
rootkit
, cracks all
distros
since 2017
🔍
Reverse Engineering
github.com
·
4h
·
Hacker News
Carrot
disclosure:
Forgejo
🛠️
Software Craft
dustri.org
·
2d
·
Lobsters
,
Hacker News
Ask HN: Best
resources
for learning systems
programming
in 2026?
🛠️
Software Craft
news.ycombinator.com
·
11h
·
Hacker News
The
Agentic
AI Security Company
🧠
Edge AI
straiker.ai
·
4d
·
Hacker News
Proxies
,
Sandboxes
and Agent Security
🌐
Networking
gouthamve.dev
·
2d
·
Hacker News
Anthropic
Mythos
– We’ve Opened
Pandora
’s Box
⚖️
Digital Rights
steveblank.com
·
2d
·
Hacker News
,
Hacker News
IPv7
: Identity-Centric Network Protocol for Security, Proxy Mitigation, and
Operability
🌐
Networking
datatracker.ietf.org
·
5d
·
Hacker News
Why a recent supply-chain attack
singled
out security firms
Checkmarx
and Bitwarden
💾
Data Breaches
arstechnica.com
·
1d
·
Hacker News
$292 Million Lost, Zero Bugs Found: Lessons From the
rsETH
Bridge
Exploit
💾
Data Breaches
openzeppelin.com
·
4d
·
Hacker News
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help