Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Cybersecurity
infosec, exploits, vulnerabilities, pentesting
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
6652
posts in
14.6
ms
cisco-ai-defense/defenseclaw
: Security Governance for Agentic AI
🐛
Fuzzing
github.com
·
3d
·
Hacker News
·
…
A
Taxonomy
of
Cognitive
Security
🧠
Cognitive Science
schneier.com
·
22h
·
schneier.com
·
…
Training State of the Art
Vulnerability
Discovery Agents through
Reinforcement
Learning
💬
Prompt Engineering
depthfirst.com
·
2d
·
Hacker News
·
…
Intro
to Reality
Pentesting
🔲
Cellular Automata
cptkj.substack.com
·
22h
·
Substack
·
…
The “
scanner
report has to be green”
trap
🐛
Fuzzing
ubuntu.com
·
1d
·
Hacker News
·
…
The Quantum Threat to
RSA
,
ECC
, and Modern Encryption Systems
🔧
Hardware Hacking
hackernoon.com
·
3d
·
…
Spy
Tech:
Conflicts
Bring a New Number Station
🔧
Hardware Hacking
hackaday.com
·
2d
·
…
How We Hacked
BCG
's Data Warehouse — 3.17 Trillion
Rows
, Zero Authentication
🐛
Fuzzing
codewall.ai
·
1d
·
Hacker News
·
…
Vulnerability
Research Is
Cooked
🐛
Fuzzing
sockpuppet.org
·
3d
·
Lobsters
,
Hacker News
,
r/netsec
·
…
How Google Does It: An inside look at
cybersecurity
📱
Progressive Web Apps
blog.google
·
5d
·
…
RSAC
, Infosec-themes, and
crummy
products
🐛
Fuzzing
blog.thinkst.com
·
5d
·
Hacker News
·
…
scthornton/MetaLLM
: Metasploit-inspired AI/ML security testing framework with 40+ exploit modules covering OWASP LLM Top 10 vulnerabilities. For authorized penetration testing only.
🐛
Fuzzing
github.com
·
9h
·
Hacker News
·
…
2020 United States federal government data
breach
🔒
Digital Privacy
en.wikipedia.org
·
5d
·
Hacker News
·
…
The Cybersecurity Value Chain: How 25 Companies
Fill
72
Foundational
Roles
🎨
Design Systems
hackernoon.com
·
16h
·
…
LangDrained
: Path traversal, SQL injection, and
Deserialization
of untrusted data in LangChain
🐛
Fuzzing
cyera.com
·
3d
·
Hacker News
,
r/netsec
·
…
Show HN:
Spectator
, a Programming Language for
Cybersecurity
🎥
WebRTC
news.ycombinator.com
·
6d
·
Hacker News
·
…
European Commission
investigating
breach after Amazon cloud account
hack
🔧
Hardware Hacking
bleepingcomputer.com
·
4d
·
Hacker News
·
…
Hacker's AI: The
Messy
Reality of
Weaponized
AI
🔧
Hardware Hacking
hackernoon.com
·
6d
·
…
How to Write a
VAPT
Report That
Clients
Actually Read (And Pay For)
✍️
Tech Essays
hackernoon.com
·
3d
·
…
Show HN:
Spectator
: A Robust programming language made for
Cybersecurity
⚡
Reactive Programming
news.ycombinator.com
·
6d
·
Hacker News
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help