🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Iranian Educated Manticore Targets Leading Tech Academics
research.checkpoint.com·4h
🌐BGP Security
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.com·8h
🎫Kerberos Exploitation
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
unit42.paloaltonetworks.com·19h
🎫Kerberos Exploitation
Easy $150: Misconfigured SSO Led to Account Takeover
infosecwriteups.com·9h
🔓Hacking
Microsoft Teams Security Attack Matrix
cyberdom.blog·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
Top Strategies for Preventing Domain Hijacking
securityscorecard.com·21h
🌐BGP Security
Your Token Becomes Worthless: Unveiling Rug Pull Schemes in Crypto Token via Code-and-Transaction Fusion Analysis
arxiv.org·1d
🔗Hash Chains
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.com·19h
🎫Kerberos Exploitation
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·1d
🔐Quantum Security
Cyber insurance premiums dropped for the first time in 2024
metacurity.com·3h
🔓Hacking
6 Key Security Risks in LLMs: A Platform Engineer’s Guide
thenewstack.io·22h
💻Local LLMs
Sextortion email scammers increase their “Hello pervert” money demands
malwarebytes.com·7h
🕵️Vector Smuggling
Behind Scattered Spider: Activity, TTPs, and What to Watch For
bitsight.com·1d
🎫Kerberos Exploitation
How do CAPTCHAs Work?
corero.com·4h
⚡Proof Automation
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
securelist.com·7h
🎯Threat Hunting
Investing in crypto? Beware of these scams
the-independent.com·7h
🔗Hash Chains
CVE Chaos, MCPs, and the Fight for Better Vulnerability Data: A Recap of runZero Hour 19
runzero.com·1d
🏺Kerberos Archaeology
Microsoft Entra ID OAuth Phishing and Detections
elastic.co·17h
🎯NTLM Attacks
What is new account fraud & how to prevent it
fingerprint.com·1d
🏺Kerberos Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap