🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏒 Active Directory

LDAP Attacks, Bloodhound, Domain Enumeration, Kerberos

The scourge of excessive AS-SETs
blog.apnic.netΒ·1d
🌐BGP Security
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.comΒ·21h
🎫Kerberos Exploitation
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·5h
πŸ•΅οΈPenetration Testing
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
How do CAPTCHAs Work?
corero.comΒ·6h
⚑Proof Automation
WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·6h
πŸ’£ZIP Vulnerabilities
Easy $150: Misconfigured SSO Led to Account Takeover
infosecwriteups.comΒ·11h
πŸ”“Hacking
See More, Worry Less: Managed Database Observability, Monitoring, and Hardening Advancements
digitalocean.comΒ·1d
πŸ“ŠHomelab Monitoring
Lone wolf cyber attacks form worrying new trend, report warns
the-independent.comΒ·2h
πŸ”“Hacking
What Is an AI SOC Agent? What You Need to Know About the Most Strategic Operational Imperative in Cybersecurity Today
intezer.comΒ·1h
🎯Threat Hunting
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comΒ·6h
🎫Kerberos Attacks
Cyber insurance premiums dropped for the first time in 2024
metacurity.comΒ·5h
πŸ”“Hacking
Web Numbers
ar.alΒ·4hΒ·
Discuss: Hacker News
πŸ“‘DNS Archaeology
Critical vulnerability in Citrix Netscaler raises specter of exploitation wave
cybersecuritydive.comΒ·4h
πŸ”“Hacking
Does "XBOW AI Hacker" Deserve the Hype?
utkusen.substack.comΒ·3hΒ·
Discuss: Substack
πŸ”“Hacking
Networking for Systems Administrators
mwl.ioΒ·6hΒ·
Discuss: Hacker News
🌐DNS over QUIC
The Dark Side of Azure Identity & Access Management – 5 IAM & Entra ID Security Risks You Can’t Ignore
blog.compass-security.comΒ·1d
πŸ”“LDAP Injection
IP Sentry (Golang)
dev.toΒ·1dΒ·
Discuss: DEV
πŸ›‘οΈeBPF Security
IBM Storage Protect Server is vulnerable to authorization bypass attack
ibm.comΒ·1dΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Loading...Loading more...
AboutBlogChangelogRoadmap