๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽซ Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Let the Games Begin: How Cybersecurity Competitions Build Skills, Careers, and Community
backblaze.comยท1d
๐ŸŽฏThreat Hunting
Checking data integrity
eclecticlight.coยท1d
โœ…Checksum Validation
Steam Bends to Payment Processors on Porn Games
404media.coยท20h
โš–๏ธEmulation Ethics
Enhancing Security with EKS Pod Identities: Implementing the Principle of Least Privilege
reddit.comยท1dยท
Discuss: r/kubernetes
๐Ÿ“ฆContainer Security
Why 1Password hasn't released an MCP server
blog.1password.comยท10hยท
Discuss: Hacker News
๐Ÿ”ŒInterface Evolution
EchoVaults - Digital Vaults for loved ones in emergency situations.
echovaults.orgยท12hยท
Discuss: Hacker News
๐Ÿ Personal Archiving
Huawei's star AI model was built on burnout and plagiarism
the-open-source-ward.ghost.ioยท1dยท
Discuss: Hacker News
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Prompt Injection in LLM-Driven Systems
blog.gopenai.comยท2dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Security
Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation
darknet.org.ukยท1d
๐Ÿฆ Malware Analysis
Thought Purity: Defense Paradigm For Chain-of-Thought Attack
arxiv.orgยท7h
๐Ÿ›ก๏ธProof-Carrying Archives
AI Agents Are Growing Up - And They Need Zero-Trust Parenting
hackernoon.comยท4h
๐ŸŽฏThreat Hunting
Mitigating the risks of package hallucination and 'slopsquatting'
techradar.comยท21h
๐Ÿ”“Hacking
Belk hit by May cyberattack: DragonForce stole 150GB of data
securityaffairs.comยท1d
๐Ÿ›กCybersecurity
My wild ride from building a proxy server in rust to a data plane for AI โ€” and landing a $250K Fortune 500 customer.
reddit.comยท1dยท
Discuss: r/rust
๐Ÿ”ŒInterface Evolution
Lessons Learned From McDonald's Big AI Flub
darkreading.comยท1d
๐Ÿ”“Hacking
This dangerous new Android malware looks to hide from detection with distorted APKs
techradar.comยท21h
๐Ÿ’ฃZIP Vulnerabilities
Resetting Microsoft Entra ID Passwords Using Sentinel Playbooks Triggered by Incidents
infosecwriteups.comยท6h
๐Ÿ”NTLM Forensics
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
darkreading.comยท1d
๐Ÿ‘๏ธObservatory Systems
From VPN Vulnerability to SASE Victory: How A Growing Fintech Firm Transformed Its Security Posture and Scalability in Under a Week
blog.checkpoint.comยท1d
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
W1seGuy | TryHackMe Walkthrough โ€” XOR? BrUt3_F0rC3 iT
infosecwriteups.comยท3d
๐Ÿ”Cryptographic Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap