๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿข Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

Intelligence Brief - Exploitation of Microsoft Vulnerability CVE-2025-53770
cstromblad.comยท13h
๐ŸŽซKerberos Exploitation
No, Your chatbot can't be hacked via DNS (at least not on its own)
domainsure.comยท1dยท
Discuss: Hacker News
๐ŸŒDNS Security
AIโ€™s Double Edge: How AI Expands the Attack Surface & Empowers Defenders
sentinelone.comยท1h
๐Ÿ Homelab Security
Rumble in the jungle: APT41โ€™s new target in Africa
securelist.comยท1d
๐ŸŽซKerberos Exploitation
The Rise of Acreed Infostealer in the Post-LummaC2 Threat Landscape
bitsight.comยท9h
๐ŸŽซKerberos Exploitation
How Apps and Your Phone Can Expose Your Life Without Permission
paloaltonetworks.comยท8h
๐Ÿ›กCybersecurity
Three Chinese threat groups exploited SharePoint flaws, Microsoft
metacurity.comยท7h
๐Ÿ”“Hacking
Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers
circleid.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
SharePoint under fire: new ToolShell attacks target enterprises
securityaffairs.comยท4h
๐Ÿ›กCybersecurity
Building Multi-Agent Solutions with Semantic Kernel and A2A Protocol
devblogs.microsoft.comยท2hยท
Discuss: Hacker News
โš™๏ธTLA+
You Canโ€™t Fix What You Canโ€™t See: Navigating Section 889 Compliance in 2025
runzero.comยท6h
๐Ÿ’ฟWORM Storage
https://github.com/lldap/lldap
github.comยท1d
๐Ÿ”’LDAP Security
Logbit: A Free AI-Powered Tool for Windows & Active Directory Log Analysis
dev.toยท9hยท
Discuss: DEV
๐Ÿ”NTLM Forensics
I Spy: Escalating to Entra ID's Global Admin with a First-Party App
securitylabs.datadoghq.comยท2dยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
A chain reaction: inside the cyberattack that brought M&S to its knees
techradar.comยท12h
๐ŸŽฏThreat Hunting
Reverse Proxy Deep Dive: Why HTTP Parsing at the Edge Is Harder Than It Looks
startwithawhy.comยท6hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Inside the Heimdal Labs Deep Dive: A Closer Look at Remote Access Protection
heimdalsecurity.comยท1d
๐Ÿ›ก๏ธeBPF Security
Four Powerful, New Features to Help You Build and Deploy More Efficient Apps On DigitalOcean Kubernetes
digitalocean.comยท5h
๐ŸŒŠStreaming Systems
Disrupting active exploitation of on-premises SharePoint vulnerabilities
microsoft.comยท8h
๐Ÿ”“Hacking
Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target
blog.checkpoint.comยท8h
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap