Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎫 Kerberos Attacks
Golden Tickets, Silver Tickets, AS-REP Roasting, Delegation Abuse
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
23166
posts in
2.7
ms
Unofficial 7-zip.com website served up
malware-laden
downloads for over a week — infected PCs forced into a proxy
botnet
tomshardware.com
·
1d
🦠
Malware Analysis
US drops China
Telecom
,
TP-Link
router, and other data security bans before trade talks
metacurity.com
·
1d
🛡
Cybersecurity
AMOS
infostealer
targets macOS through a popular AI app
bleepingcomputer.com
·
1d
🔓
Password Cracking
Cryptopals-57
solution
dev.to
·
6h
·
Discuss:
DEV
⚔️
Lean Tactics
Attackers exploit
BeyondTrust
CVE-2026-1731 within hours of
PoC
release
securityaffairs.com
·
5h
🔓
Hacking
Risky Bulletin: Chinese cyber-spies
breached
all of Singapore's
telcos
news.risky.biz
·
2d
🔓
Hacking
The
OpenClaw
experiment
is a warning shot for enterprise AI security
sophos.com
·
21h
🛡️
CLI Security
Black-Box Kubernetes
Penetration
Testing
Playbook
infosecwriteups.com
·
2d
📦
Container Security
Ask HN: Where does this
adversarial
prize
mechanism
break?
news.ycombinator.com
·
1d
·
Discuss:
Hacker News
🛡️
Error Boundaries
Top Dutch telco
Odido
admits 6.2M customers caught in contact system
caper
theregister.com
·
9h
🚨
Incident Response
Google reports that state hackers from China, Russia and Iran are using Gemini in 'all stages' of attacks — phishing
lures
, coding and vulnerability testing get AI
underpinnings
from hostile actors
tomshardware.com
·
6h
🔓
Hacking
Claude desktop extension can be
hijacked
to send out
malware
by a simple Google Calendar event
techradar.com
·
1d
🎫
Kerberos Exploitation
Crazy
ransomware
gang
abuses
employee monitoring tool in attacks
bleepingcomputer.com
·
2d
🔓
Hacking
Peak +
Accumulation
: A Proxy-Level
Scoring
Formula for Multi-Turn LLM Attack Detection
arxiv.org
·
16h
🎯
Threat Hunting
Cyber
Model
Arena
wiz.io
·
1d
·
Discuss:
Hacker News
🔒
WASM Capabilities
Real-Time AI Streaming in Production: What We Built at
Helpmaton
metaduck.com
·
1d
🌊
Streaming Systems
Fake
7-Zip
downloads are turning home PCs into proxy
nodes
malwarebytes.com
·
4d
🎫
Kerberos Exploitation
Forward to hell? On
misusing
transparent DNS
forwarders
For amplification attacks
blog.apnic.net
·
1d
🌐
DNS Security
Account Takeover using
Improper
Authorization
in “Check Availability” Feature
infosecwriteups.com
·
2d
🎫
Kerberos Exploitation
30+ Chrome
extensions
disguised
as AI chatbots steal users' API keys, emails, other sensitive data
theregister.com
·
22h
🔓
Hacking
Sign up or log in to see more results
Sign Up
Login
« Page 2
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help