Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
121433
posts in
1.65
s
Asking Eric: Am I being
paranoid
about what my friendsβ
Alexa
does?
orlandosentinel.com
Β·
22h
π
Fuzzing
CVE-2026-1529 -
Org.keycloak.services.resources.organizations
:
keycloak
: unauthorized organization registration via
improper
invitation token validation
cvefeed.io
Β·
21h
Β·
Discuss:
Lobsters
π
Browser Exploitation
What to Do with Your First Home
Lab
blackhillsinfosec.com
Β·
19h
π
Reverse Engineering
Inside
GhostPoster
: How a PNG Icon
Infected
50,000 Firefox Users
koi.ai
Β·
2d
π
Browser Exploitation
Teleport
Authentication
goteleport.com
Β·
1d
π₯
Exploit Development
Feb
. 11, 2026
blog.ctms.me
Β·
1d
π
Browser Exploitation
OpenClaw
: I gave an AI my credit card and let it
loose
on Amazon
codedojo.com
Β·
2d
Β·
Discuss:
Hacker News
π
Browser Exploitation
CIC-Trap4Phish
: A Unified Multi-Format Dataset for Phishing and
Quishing
Attachment Detection
arxiv.org
Β·
2d
π₯
Exploit Development
Tutorialkit.rb
: the ruby.wasm journey goes onwardβMartian Chronicles, Evil
Martians
β team blog
evilmartians.com
Β·
2d
π
Browser Exploitation
2.
OAuth
Misbinding
Vulnerability
infosecwriteups.com
Β·
1d
π
Browser Exploitation
Stop Testing Attacks, Start
Diagnosing
Defenses: The
Four-Checkpoint
Framework Reveals Where LLM Safety Breaks
arxiv.org
Β·
1d
π₯
Exploit Development
Writeup for OSINT tasksβββ
MOJO
JOJO
CTF.
medium.com
Β·
2d
π₯
Exploit Development
ELA-1642-1
python3.7
security update
freexian.com
Β·
2d
π₯
Exploit Development
U.S.
CISA
adds Microsoft Office and Microsoft Windows flaws to its Known
Exploited
Vulnerabilities catalog
securityaffairs.com
Β·
1d
π₯
Exploit Development
Fortinet
Patches Critical
SQLi
Flaw Enabling Unauthenticated Code Execution
thehackernews.com
Β·
2d
π₯
Exploit Development
supabase-community/copycat
: Generate deterministic fake values: The same input will always generate the same fake-output.
github.com
Β·
15h
π
Fuzzing
UblockOrigin
[dot]app (*not*
affiliated
with uBlock Origin)
discuss.privacyguides.net
Β·
13h
π
Browser Exploitation
A tag read the
consent
state before a
default
was set. Can anyone tell me how to fix this? Google tag manager
i.redd.it
Β·
1d
Β·
Discuss:
r/webdev
π
Fuzzing
All you need to know about the iPhone's
Lockdown
Mode
techxplore.com
Β·
45m
π
Browser Exploitation
GHSA-7PPG-37FH-VCR6
: Vector Injection? No, Just Regular Injection: Milvus Critical Auth Bypass
dev.to
Β·
10h
Β·
Discuss:
DEV
π
Browser Exploitation
Loading...
Loading more...
« Page 16
β’
Page 18 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help