🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”“ LDAP Injection

Directory Services, Authentication Bypass, Injection Attacks, Enterprise Security

️‍♂️ Tracking AgentTesla: Real-World Malware Behavior Analysis Using Joe Sandbox
infosecwriteups.comΒ·6h
🦠Malware Analysis
Authentication vs. authorization: What’s the difference?
proton.meΒ·4h
πŸ”Capability Systems
Attractive Metadata Attack: Inducing LLM Agents to Invoke Malicious Tools
arxiv.orgΒ·11h
⚑Proof Automation
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation
circleid.comΒ·15h
🌐DNS Security
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgΒ·2d
πŸ’£ZIP Vulnerabilities
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.ioΒ·27mΒ·
Discuss: Hacker News
πŸ§ͺBinary Fuzzing
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comΒ·21h
🎫Kerberos Attacks
Security update: Phishing attacks on IBM Operational Decision Manager possible
heise.deΒ·1d
πŸ”“Hacking
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comΒ·1d
🦠Malware Analysis
Building highly available services: global anycast PowerDNS cluster
quantum5.caΒ·19h
🌐DNS Security
From detection to trust: the evolving challenge of AI bot authentication
blog.castle.ioΒ·4hΒ·
Discuss: Hacker News
🎫Kerberos History
SonicWall investigates possible zero-day amid Akira ransomware surge
securityaffairs.comΒ·5h
πŸ”“Hacking
SEP-XXXX: Server-Side Authorization Management with Client Session Binding
github.comΒ·21hΒ·
Discuss: Hacker News
⚑gRPC
Securing OAuth: Best Practices for Safer Authorization Flows
dev.toΒ·1dΒ·
Discuss: DEV
🎯NTLM Attacks
ELA-1492-1 python-setuptools security update
freexian.comΒ·4h
πŸ“¦Container Security
How to implement PaC for a more secure SDLC
reversinglabs.comΒ·5m
🏠Homelab Automation
SIEVE β€” a better algorithm than LRU?
blog.apnic.netΒ·9h
πŸ’¨Cache Analysis
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
news.sophos.comΒ·3h
🎫Kerberos History
Detection Engineering: Practicing Detection-as-Code – Validation – Part 3
blog.nviso.euΒ·8h
βœ…Archive Validation
In Cybersecurity, We Have to Work Together
tenable.comΒ·5h
πŸ”“Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap