Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎫 Kerberos Attacks
Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
27724
posts in
42.5
ms
Phishing campaign exploits
OAuth
redirection
to bypass defenses
securityaffairs.com
·
1h
🛡
Cybersecurity
Show HN: Personal AI
gateway
for
OpenClaw
github.com
·
9h
·
Discuss:
Hacker News
🤖
Network Automation
A
stolen
Gemini API key
turned
a $180 bill into $82,000 in two days
techspot.com
·
16h
🎫
Kerberos History
The Family Laptop Trap:
Unmasking
a Go-Based
Crypto-Heist
infosecwriteups.com
·
6h
🔓
Hacking
Fooling
AI Agents: Web-Based
Indirect
Prompt Injection Observed in the Wild
unit42.paloaltonetworks.com
·
1h
🎯
Threat Hunting
Using Aisle to Find Vulnerabilities in Amazon's Crypto Stack:
AWS-LC
and
S2n-TLS
aisle.com
·
1h
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Phish
of the day: Microsoft OAuth scams abuse
redirects
for malware delivery
theregister.com
·
12h
🎫
Kerberos Exploitation
2nd March – Threat Intelligence Report
research.checkpoint.com
·
20h
🎯
Threat Hunting
OAuth
redirection
abuse enables phishing and malware delivery
microsoft.com
·
17h
🎫
Kerberos Exploitation
Anansi
: Scalable
Characterization
of Message-Based Job Scams
arxiv.org
·
1d
🔍
BitFunnel
Chrome flaw let extensions
hijack
Gemini’s camera,
mic
, and file access
malwarebytes.com
·
42m
🛡️
WebAssembly Security
This new
phishing
campaign uses a fake Google Account security page to steal
passcodes
and more
techradar.com
·
27m
🛣️
BGP Hijacking
22.00.0185 A security
incident
johnnydecimal.com
·
6h
🛡
Cybersecurity
Kerberoasting
and
BloodHound
: Two Attacks That Show Why Active Directory Is Hard to Defend
medium.com
·
5d
🏢
Active Directory
Docker
Scout
vs Traditional Container
Scanners
: Why Context Beats CVE Noise
hackernoon.com
·
1d
📦
Container Security
How
Deepfakes
and Injection Attacks Are Breaking Identity
Verification
bleepingcomputer.com
·
21h
✅
Verification Codecs
ClawJacked
flaw exposed
OpenClaw
users to data theft
securityaffairs.com
·
1d
🔓
Hacking
Portswigger
Walkthrough Lab: Username enumeration via
subtly
different responses
infosecwriteups.com
·
6h
🌐
DNS Security
Rare Not Random – Using
Token
Efficiency for Secrets
Scanning
lookingatcomputer.substack.com
·
6h
·
Discuss:
Substack
🌳
Huffman Variants
InfoSec News Nuggets 03/02/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
15h
🛡
Cybersecurity
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help