🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Exploitation

Golden Tickets, Domain Enumeration, Windows Authentication, Red Team Operations

Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.comΒ·16h
🎫Kerberos Attacks
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·5h
🎫Kerberos Attacks
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.orgΒ·1d
πŸ’£ZIP Vulnerabilities
Top Strategies for Preventing Domain Hijacking
securityscorecard.comΒ·18h
🌐BGP Security
RansomLord (NG v1.0) anti-ransomware exploit tool
seclists.orgΒ·1d
🦠Malware Analysis
Networking for Systems Administrators
mwl.ioΒ·1hΒ·
Discuss: Hacker News
🌐DNS over QUIC
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.comΒ·16h
🎫Kerberos Attacks
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·2h
🦠Malware Analysis
Easy $150: Misconfigured SSO Led to Account Takeover
infosecwriteups.comΒ·6h
πŸ”“Hacking
Microsoft Teams Security Attack Matrix
cyberdom.blogΒ·23hΒ·
Discuss: Hacker News
🎫Kerberos Attacks
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.comΒ·1d
🎫Kerberos Attacks
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.comΒ·4h
🎯Threat Hunting
Stealth China-linked ORB network gaining footholds in US, East Asia
cyberscoop.comΒ·8m
πŸ•΅οΈDomain Enumeration
Microsoft Entra ID OAuth Phishing and Detections
elastic.coΒ·14h
🎯NTLM Attacks
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.devΒ·13hΒ·
Discuss: Hacker News
πŸš€Indie Hacking
CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability
dev.toΒ·19hΒ·
Discuss: DEV
πŸ”“Hacking
Cyber insurance premiums dropped for the first time in 2024
metacurity.comΒ·56m
πŸ”“Hacking
Fixes for five Lix CVEs
lix.systemsΒ·23hΒ·
Discuss: Lobsters
❄️Nix Adoption
WinRAR exploit enables attackers to run malicious code on your PC β€” critical vulnerability patched in latest beta update
tomshardware.comΒ·1h
πŸ’£ZIP Vulnerabilities
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.comΒ·44m
πŸ•΅οΈPenetration Testing
Loading...Loading more...
AboutBlogChangelogRoadmap