Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π security
reverse engineering,malware,SCADA
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
2676
posts in
54.2
ms
Containers, cloud, blockchain, AI β it's all the same old
BS
, says
RH
veteran
theregister.com
Β·
1d
Β·
Discuss:
Hacker News
,
Hacker News
π¦
Sandboxing
Domain
Knowledge Is the New
Syntax
blog.melashri.net
Β·
5h
Β·
Discuss:
Hacker News
π
Reverse Engineering
Soft
Delete
Is a
Workaround
docs.eventsourcingdb.io
Β·
19h
Β·
Discuss:
Hacker News
π¦
Sandboxing
KVM:
x86/PVM
: Introduce a new
hypervisor
(2024)
lwn.net
Β·
15h
Β·
Discuss:
Hacker News
π»
KVM
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
Β·
3d
Β·
Discuss:
Substack
π¦
Malware Analysis
Nobody
knows
how the whole system works
surfingcomplexity.blog
Β·
15h
Β·
Discuss:
Lobsters
,
Hacker News
,
r/programming
π
Reverse Engineering
Secure Boot (
Gentoo
Wiki
)
wiki.gentoo.org
Β·
19h
Β·
Discuss:
Hacker News
πΎ
UEFI
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
Β·
2d
Β·
Discuss:
Hacker News
π¦
Sandboxing
The End of
IPFS
: Centralized Pinning Single Points of Failure, Cryptographic Hash Backdoors, DDoS Exploitation, and Gossip-Based Distributed Node
Eradication
zenodo.org
Β·
17h
Β·
Discuss:
Hacker News
π¦
Sandboxing
EU AI Act:
Practical
Risk
Classification
for Business AI Use Cases
jaikin.eu
Β·
19h
Β·
Discuss:
Hacker News
π
Ghidra
Re-Identification
vs
Anonymization
Strength
testingbranch.com
Β·
1d
Β·
Discuss:
Hacker News
π
Ghidra
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
Β·
3d
Β·
Discuss:
Hacker News
π¦
Sandboxing
What to Do After a Crypto
Scam
(USA) Intelligence Cyber
Wizard
Explained
news.ycombinator.com
Β·
1d
Β·
Discuss:
Hacker News
π
Hardware Security
Spying
Chrome Extensions: 287 Extensions
spying
on
37M
users
qcontinuum.substack.com
Β·
1d
Β·
Discuss:
Substack
π
Ghidra
Full-circle Test-driven
Firmware
Development with
OpenClaw
blog.adafruit.com
Β·
2d
Β·
Discuss:
Hacker News
π
Ghidra
Show HN: We
audited
AI agent
configs
on GitHub. Every one had security issues
clawhatch.com
Β·
1d
Β·
Discuss:
Hacker News
π¦
Sandboxing
Donβt look Behind The
Curtains
!
rodyne.com
Β·
3d
Β·
Discuss:
Hacker News
π
Reverse Engineering
Webspace
Invaders
matthiasott.com
Β·
16h
Β·
Discuss:
Lobsters
,
Hacker News
π»
Rootkits
Production pain points and coordination patterns from building a
dual-orchestrator
(Claude + Kimi) system on Claude Code. 8 failure modes with specs and
invariants
.
gist.github.com
Β·
1d
Β·
Discuss:
Hacker News
π
JIT Compilation
The source code was the
moat
. But not
anymore
philipotoole.com
Β·
1d
Β·
Discuss:
Lobsters
,
Hacker News
π
Reverse Engineering
Loading...
Loading more...
« Page 1
β’
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help