๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿบ Kerberos Archaeology

Golden Ticket History, Authentication Evolution, Protocol Forensics, Windows Domain Heritage

Contain identity threats automatically with Red Canary and Microsoft Entra ID
redcanary.comยท5h
๐ŸŽซKerberos Exploitation
Stealth China-linked ORB network gaining footholds in US, East Asia
cyberscoop.comยท1d
๐ŸŽซKerberos Exploitation
Worth Reading 062425
rule11.techยท1d
๐ŸŒDNS over QUIC
New DDoS Attack Record โ€“ The MSP Cyber News Snapshot โ€“ June 26th
heimdalsecurity.comยท5h
๐Ÿ”“Hacking
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.devยท1dยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
Sonicwall warns of fake NetExtender app infected with malicious code
heise.deยท1d
๐ŸŽซKerberos Exploitation
Deadly Risks: 5 Crypto Entrepreneurs and Investors Who Paid the Ultimate Price
hackernoon.comยท12h
๐ŸŽซKerberos Attacks
5 huge stumbling blocks to legacy mainframe EOL
techradar.comยท1d
๐Ÿ›๏ธMainframe Archaeology
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems
dev.toยท1dยท
Discuss: DEV
๐ŸŽตSpectral Hashing
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.orgยท2d
๐Ÿ”—Hash Chains
Playwright: Using Cognito to Log In for Your E2E Tests
dev.toยท8hยท
Discuss: DEV
โšกProof Automation
People using ChatGPT as a security guru โ€“ and these are the questions everyone is asking
techradar.comยท8h
๐Ÿ”“Hacking
IP Sentry (Golang)
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธeBPF Security
Who are your MCP servers talking to?
dev.toยท6hยท
Discuss: DEV
๐Ÿ“ฆContainer Security
Cosmoe: New C++ toolkit for building native Wayland apps
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Keylime: Pushing the Boundaries of Remote Attestation on the Edge - DevConf.CZ 2025
youtube.comยท13h
๐Ÿ”’Hardware Attestation
Beware of fake SonicWall VPN app that steals users' credentials
theregister.comยท2d
๐ŸŽฏNTLM Attacks
Fighting logs with Log Detective - DevConf.CZ 2025
youtube.comยท13h
๐Ÿ“Log Parsing
Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.comยท1d
๐ŸŽซKerberos Attacks
Using OpenTelemetry to Diagnose a Critical Memory Leak
hackernoon.comยท1d
๐Ÿ‘๏ธSystem Observability
Loading...Loading more...
AboutBlogChangelogRoadmap