Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎭 Social Engineering
phishing, pretexting, vishing, human hacking
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
183612
posts in
134.6
ms
AI-Augmented
Social Engineering: When Trust
Becomes
a Control-Plane Risk
🛡️
AI Security
zenodo.org
·
1d
·
Hacker News
Phishing
reclaims
the top initial access spot,
attackers
experiment with AI tools
🎫
Kerberos History
helpnetsecurity.com
·
4d
Why
Phishing
Still Works (Even If You Know About It)
🍯
Deception Technology
infosecwriteups.com
·
20h
Crime crew
impersonates
help desk,
abuses
Microsoft Teams to steal your data
🎫
Kerberos Exploitation
theregister.com
·
1d
Chinese
Phishing
Campaign
🍯
Deception Technology
malware.news
·
6d
How
UNC6692
Employed
Social Engineering to Deploy a Custom Malware Suite
🦠
Malware
sh.itjust.works
·
2d
No
Exploit
Needed: How
Attackers
Walk Through the Front Door via Identity-Based Attacks
🔐
IAM
sans.org
·
2d
UNC6692
Impersonates
IT Helpdesk via Microsoft Teams to Deploy SNOW Malware
🚧
Execution Guardrails
thehackernews.com
·
3d
Surge in Silent Subject Phishing
Campaigns
Target
VIP
Users
🎭
Obfuscation
infosecurity-magazine.com
·
4d
Spotting
the spyware: How modern spies are
weaponizing
phishing
🍯
Deception Technology
techradar.com
·
5d
How AI Changed
Vishing
: Case of
PlugValley
📋
AGENTS.md
socradar.io
·
4d
When a Real
OTP
Meets a Fake One: How a Modern
Phishing
Attack Works
🍯
Deception Technology
medium.com
·
5d
Regular
Password
Resets
Aren’t as Safe as You Think
🔓
Password Cracking
bleepingcomputer.com
·
3d
Phishing and
MFA
exploitation
: Targeting the keys to the kingdom
🔒
Security
blog.talosintelligence.com
·
5d
Mass Phishing on YouTube: How a
Malicious
Extension
Hijacks
Facebook Accounts and How I Exposed Its…
🌐
Web Exploits
medium.com
·
6d
Go With the Flow:
Abusing
OAuth
Device Code Flow
🚧
Execution Guardrails
levelblue.com
·
6d
Snow
Flurries
: How
UNC6692
Employed Social Engineering to Deploy a Custom Malware Suite
🚧
Execution Guardrails
cloud.google.com
·
3d
'Identity is the new
battleground
': Why your IT
helpdesk
is suddenly getting a lot of bizarre calls
🎭
Token Impersonation
techradar.com
·
3d
Snow
Flurries
: How
UNC6692
Employed Social Engineering to Deploy a Custom Malware Suite
🛡️
OWASP
malware.news
·
3d
Phishing and
MFA
exploitation
: Targeting the keys to the kingdom
🔒
Security
malware.news
·
5d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help