🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth
unit42.paloaltonetworks.comΒ·1d
🌐DNS Security
Intelligence Insights: August 2025
redcanary.comΒ·1d
πŸ“‘Feed Security
This Week in Security: Anime Catgirls, Illegal AdBlock, and Disputed Research
hackaday.comΒ·16h
πŸ”“Hacking
Reset Cookies and force new sign-in using ASP.NET Core Identity
damienbod.comΒ·7hΒ·
Discuss: Hacker News
🏺Kerberos Archaeology
Hackers deploy DripDropper via Apache ActiveMQ flaw, patch systems to evade detection
securityaffairs.comΒ·1d
πŸ”“Hacking
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
microsoft.comΒ·1d
πŸ”“Hacking
Microsoft PC Manager: Critical gap allows privilege escalation
heise.deΒ·10h
πŸ”ŒOperating system internals
Exploiting API4 β€” 8 Real-World Unrestricted Resource Consumption Attack Scenarios (and How to Stop Them)
lab.wallarm.comΒ·19h
⚑gRPC
InfoSec News Nuggets 8/21/2025
aboutdfir.comΒ·1d
πŸ”“Hacking
Hackers Abuse VPS Infrastructure for Stealth, Speed
darkreading.comΒ·1d
🎫Kerberos Attacks
Cryptography for the Everyday Developer: Understanding AES - The Advanced Encryption Standard
sookocheff.comΒ·15h
πŸ”Cryptographic Archaeology
Locking Down the WordPress Login Page
blog.sucuri.netΒ·8h
🎯NTLM Attacks
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
isc.sans.eduΒ·2d
🌐DNS Security
The Art of the Honeypot Account: Making the Unusual Look Normal
adsecurity.orgΒ·4d
🏒Active Directory
'Impersonation as a service' the next big thing in cybercrime
theregister.comΒ·1d
πŸ”“Hacking
Tearing Apart the Undetected (OSX)Coldroot RAT
objective-see.comΒ·1d
πŸ“ŸTerminal Forensics
The ABCs of β€œβ€‘ishing”: From Phishing to Quishing
bitsight.comΒ·1d
🎯Threat Hunting
Hacker and Physicist – A Tale of "Common Sense"
supasaf.comΒ·14hΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
ELA-1502-1 apache2 security update
freexian.comΒ·1d
πŸ›‘οΈeBPF Security
China-nexus hacker Silk Typhoon targeting cloud environments
cybersecuritydive.comΒ·15h
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap