🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Microsoft's cloud service restored after reports of cut cables in the Red Sea
engadget.com·7h
🏴‍☠️Piracy
How did Tether profit $13B in 2024 from USDT?
antongolub.substack.com·6h·
Discuss: Substack
🌳Archive Merkle Trees
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
portswigger.net·4d·
Discuss: Lobsters, Hacker News, r/programming
🛡️Security Headers
Popular chatbots are amplifying more misinformation, study finds
axios.com·1d·
Discuss: Hacker News
📰RSS Reading Practices
Stripe's Tempo and the Ghost of Facebook's Libra's Past
forbes.com·2d·
Discuss: Hacker News
🤝Distributed Consensus
Experts explain whether you should ‘accept’ or ‘reject’ all cookies
the-independent.com·16h
⚖️Legal Compliance
GPT-5 Thinking in ChatGPT (aka Research Goblin) is shockingly good at search
simonwillison.net·1d·
Discuss: Hacker News, Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Using Claude Code SDK to Reduce E2E Test Time by 84%
jampauchoa.substack.com·1d·
Discuss: Substack
🐛Fuzzing
Automating Security Research: AI Engine Exploits Complex Blind Code Injection
blog.ostorlab.co·3d·
Discuss: Hacker News
⚡Proof Automation
The Aider Local Model Experience
hexeditreality.com·2d·
Discuss: Hacker News
⚡Proof Automation
CVE-2025-8088 WinRAR Exploit: From Zero-Day to Zero-Risk with TruRisk™ Eliminate
blog.qualys.com·2d
💣ZIP Vulnerabilities
I have hacked to gather a software stack to take over the world
yetanotherprojecttosavetheworld.org·4d·
Discuss: Hacker News
🚀Indie Hacking
Tool Masking: The Layer MCP Forgot
towardsdatascience.com·2d
✨Effect Handlers
Scammer posing as stranded astronaut convinces woman to send him $6,750 to buy oxygen
techspot.com·2d·
Discuss: r/news
🏺Kerberos Archaeology
Shell to pay: Crims invade your PC with CastleRAT malware, now in C and Python
theregister.com·2d
🔓Hacking
pathwaycom/llm-app
github.com·30m
🔄Archive Workflows
How Gray-Zone Hosting Companies Protect Data the US Wants Erased
darkreading.com·3d
🚀Indie Hacking
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
tenable.com·2d
🌐Network Security
Ask HN: How much can we trust open-source projects or our hardware?
news.ycombinator.com·2h·
Discuss: Hacker News
🔒Hardware Attestation
Knock-on effects of software dev break-in hit schools trust
theregister.com·2d
🔐PKI Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap