🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎫 Kerberos Attacks

Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse

Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
socket.dev·17h·
Discuss: Hacker News
🚀Indie Hacking
CVE-2025-32975 - Quest KACE SMA Authentication Bypass
seclists.org·1d
🛡Cybersecurity
How to Quantify Risk and Communicate Effectively: Step 4 to TruRisk™
blog.qualys.com·3h
🎯Threat Hunting
Nearly half of companies say they pay up ransomware demands - but here's why that could be a bad idea
techradar.com·3h
🛡Cybersecurity
Stealth China-linked ORB network gaining footholds in US, East Asia
cyberscoop.com·4h
🎫Kerberos Exploitation
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.com·6h
🔒Hardware Attestation
LetsDefend.io | SOC202- FakeGPT Malicious Chrome Extension
dev.to·2d·
Discuss: DEV
🛡️Security Headers
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·5h
🦠Malware Analysis
How Foreign Scammers Use U.S. Banks to Fleece Americans
propublica.org·9h·
Discuss: Hacker News
🧬PostgreSQL Forensics
Cambridge Cybercrime Conference 2025 – Liveblog
lightbluetouchpaper.org·3h
🎯Threat Hunting
Exploiting the Human Layer: Scattered Spider’s Identity-Centric Attack Chain (2022–2025)
research.kudelskisecurity.com·2d
🎯Threat Hunting
Cyber Threat Alliance Welcomes Baffin Bay Networks, a Mastercard company, as Newest Member
cyberthreatalliance.org·8h
🛡Cybersecurity
Whale-watching the stablecoin trade in ersatz roubles for sort-of dollars
ft.com·13h
🔗Hash Chains
Augmenting Penetration Testing Methodology with Artificial Intelligence – Part 3: Arcanum Cyber Security Bot
blackhillsinfosec.com·4h
🕵️Penetration Testing
Australian authorities say top crypto ATM users are scam victims and money mules — most transactions from victims or mules forced to deposit money into the mach...
tomshardware.com·2h
🧬PostgreSQL Forensics
Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
theregister.com·21h
🔓Hacking
How to (Almost) solve cybersecurity once and for all
adaptive.live·22h·
Discuss: Hacker News
🔐Systems Hardening
Scammers Are Using Malicious URLs to Embed Fake Phone Numbers in Legit Site Searches
lifehacker.com·23h
🏴‍☠️Piracy
Program Execution, follow-up
windowsir.blogspot.com·6h·
Discuss: www.blogger.com
⚡Performance Tools
Bought and sold: How the data economy undermines democracy
proton.me·23h
🕳️Information Leakage
Loading...Loading more...
AboutBlogChangelogRoadmap