Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎫 Kerberos Attacks
Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
22574
posts in
236.8
ms
0APT
ransomware group rises swiftly with
bluster
, along with genuine threat of attack
cyberscoop.com
·
1d
🎫
Kerberos Exploitation
Carding-as-a-Service
: The
Underground
Market of Stolen Cards
rapid7.com
·
1d
🔍
BitFunnel
How to
detect
bot-driven job application fraud in
ATS
platforms
fingerprint.com
·
20h
🏢
LDAP Forensics
Four Seconds to Botnet - Analyzing a Self
Propagating
SSH Worm with
Cryptographically
Signed C2 [Guest Diary], (Wed, Feb 11th)
isc.sans.edu
·
1d
🏠
Homelab Pentesting
'Simple but dangerous’ – Top
VPNs
targeted by
typosquatting
as 14% of fake domains found to be malicious
techradar.com
·
2d
🌐
DNS Security
drm
subsystem
AI patch review
airlied.blogspot.com
·
8h
·
Discuss:
airlied.blogspot.com
🎫
Kerberos Exploitation
Fake
recruiter
campaign targets crypto developers with
RAT
reversinglabs.com
·
2d
🚀
Indie Hacking
NEWS
ROUNDUP
digitalforensicsmagazine.com
·
1d
🚨
Incident Response
jovanSAPFIONEER/Network-AI
: Multi-Agent Swarm Orchestration Skill for
OpenClaw
github.com
·
1h
·
Discuss:
Hacker News
⚔️
Lean Tactics
Copilot Studio agent security: Top 10 risks you can
detect
and
prevent
microsoft.com
·
19h
🔓
Hacking
Attackers exploit
BeyondTrust
CVE-2026-1731 within hours of
PoC
release
securityaffairs.com
·
34m
🔓
Hacking
Cryptopals-57
solution
dev.to
·
54m
·
Discuss:
DEV
⚔️
Lean Tactics
A Peek Into
Muddled
Libra
’s Operational Playbook
unit42.paloaltonetworks.com
·
2d
🔓
Hacking
Unofficial 7-zip.com website served up
malware-laden
downloads for over a week — infected PCs forced into a proxy
botnet
tomshardware.com
·
1d
🦠
Malware Analysis
30+ Chrome
extensions
disguised
as AI chatbots steal users' API keys, emails, other sensitive data
theregister.com
·
16h
🔓
Hacking
Black-Box Kubernetes
Penetration
Testing
Playbook
infosecwriteups.com
·
2d
📦
Container Security
US drops China
Telecom
,
TP-Link
router, and other data security bans before trade talks
metacurity.com
·
23h
🛡
Cybersecurity
When
Handshakes
Tell the Truth: Detecting Web Bad Bots via TLS
Fingerprints
arxiv.org
·
2d
🎯
NTLM Attacks
AMOS
infostealer
targets macOS through a popular AI app
bleepingcomputer.com
·
1d
🔓
Password Cracking
Ask HN: Where does this
adversarial
prize
mechanism
break?
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🛡️
Error Boundaries
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help