Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎫 Kerberos Attacks
Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17126
posts in
684.9
ms
Fake
7-Zip
downloads are turning home PCs into proxy
nodes
malwarebytes.com
·
20h
🎫
Kerberos Exploitation
Show HN: Have I Been
Clawned
– 72-check security audit for
OpenClaw
agents
haveibeenclawned.com
·
18h
·
Discuss:
Hacker News
🎫
Kerberos Exploitation
Someone's attacking
SolarWinds
WHD
to steal high‑privilege credentials - but we don't know who or how
theregister.com
·
9h
🎫
Kerberos Exploitation
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
1d
·
Discuss:
DEV
🚀
Indie Hacking
'Digital
squatting
' hits new levels as hackers target brand
domains
techradar.com
·
17h
🔓
Hacking
Malicious
Agent Skills in the Wild: A Large-Scale Security
Empirical
Study
arxiv.org
·
1d
🎯
Threat Hunting
Scammers
Are Sending Fake
Invites
With Malware
lifehacker.com
·
16h
🚀
Indie Hacking
South Korean crypto exchange
races
to recover $
40bn
of bitcoin sent to customers by mistake
theguardian.com
·
3h
🔗
Hash Chains
The Myth of “Known APIs”: Why
Inventory-First
Security Models Are Already
Obsolete
lab.wallarm.com
·
18h
🔒
WASM Capabilities
BeyondTrust
fixes critical
pre-auth
bug allowing remote code execution
securityaffairs.com
·
11h
🔓
Hacking
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
19h
🚨
Incident Response
The $5 Million Mistake: How a Single Phishing Email Brought a Federal
Contractor
to Its
Knees
syncsuptech.substack.com
·
1h
·
Discuss:
Substack
🔓
Hacking
LLMs
Refuse
High-Cost Attacks but Stay
Vulnerable
to Cheap, Real-World Harm
expectedharm.github.io
·
2h
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
Webspace
Invaders
matthiasott.com
·
1d
·
Discuss:
Lobsters
,
Hacker News
🌐
WARC Forensics
Sleeper Shells: How Attackers Are Planting Dormant Backdoors in
Ivanti
EPMM
defusedcyber.com
·
16h
·
Discuss:
Hacker News
📦
Container Security
DNS-PERSIST-01
; Handling Domain Control Validation in a short-lived
certificate
World
scotthelme.ghost.io
·
13h
🌐
DNS over QUIC
InfoSec News Nuggets 02/09/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
18h
🛡
Cybersecurity
Risky Bulletin:
SmarterTools
hacked
via its own product
news.risky.biz
·
1d
🔓
Hacking
SHIELD.md
: A Security Standard for
OpenClaw
and AI Agents
blog.securitybreak.io
·
1d
🛡️
CLI Security
Signing JSON Web
Tokens
: Algorithm
Tradeoffs
, Performance, and Security
ciamweekly.substack.com
·
16h
·
Discuss:
Substack
✅
Checksum Validation
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help