🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏒 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

Intelligence Brief - Exploitation of Microsoft Vulnerability CVE-2025-53770
cstromblad.comΒ·5h
🎫Kerberos Exploitation
No, Your chatbot can't be hacked via DNS (at least not on its own)
domainsure.comΒ·20hΒ·
Discuss: Hacker News
🌐DNS Security
Rumble in the jungle: APT41’s new target in Africa
securelist.comΒ·1d
🎫Kerberos Exploitation
The Rise of Acreed Infostealer in the Post-LummaC2 Threat Landscape
bitsight.comΒ·1h
🎫Kerberos Exploitation
How Apps and Your Phone Can Expose Your Life Without Permission
paloaltonetworks.comΒ·23m
πŸ›‘Cybersecurity
Baring the DNS Traces of the Slow Pisces Attack on Cryptocurrency Developers
circleid.comΒ·16h
πŸ›£οΈBGP Hijacking
https://github.com/lldap/lldap
github.comΒ·1d
πŸ”’LDAP Security
SharePoint server software security flaw sparked global attacks
metacurity.comΒ·22h
πŸ”“Hacking
Logbit: A Free AI-Powered Tool for Windows & Active Directory Log Analysis
dev.toΒ·2hΒ·
Discuss: DEV
πŸ”NTLM Forensics
I Spy: Escalating to Entra ID's Global Admin with a First-Party App
securitylabs.datadoghq.comΒ·1dΒ·
Discuss: Hacker News
🎫Kerberos Exploitation
A chain reaction: inside the cyberattack that brought M&S to its knees
techradar.comΒ·4h
🎯Threat Hunting
SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers
sentinelone.comΒ·14h
🎫Kerberos Exploitation
AIOps - A Multifaceted Challenge
blog.raymond.burkholder.netΒ·19h
πŸ¦‹Format Evolution
Inside the Heimdal Labs Deep Dive: A Closer Look at Remote Access Protection
heimdalsecurity.comΒ·23h
πŸ›‘οΈeBPF Security
Disrupting active exploitation of on-premises SharePoint vulnerabilities
microsoft.comΒ·23m
πŸ”“Hacking
Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target
blog.checkpoint.comΒ·22m
🎯Threat Hunting
🚨 New deep-dive from Policy as Code: β€œCritical Container Registry Security Flaw: How Multi-Architecture Manifests Create Attack Vectors.”
policyascode.devΒ·2d
πŸ“¦Container Security
21st July – Threat Intelligence Report
research.checkpoint.comΒ·18h
πŸ”“Hacking
Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief
unit42.paloaltonetworks.comΒ·14h
πŸ”“Hacking
MS warns 'active attacks' on its tech, experts 'assume you've been compromised'
pcgamer.comΒ·21hΒ·
Discuss: Hacker News
πŸ›‘Cybersecurity
Loading...Loading more...
AboutBlogChangelogRoadmap