๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽฏ NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Securing OAuth: Best Practices for Safer Authorization Flows
dev.toยท19hยท
Discuss: DEV
๐Ÿ“ฆContainer Security
Hackers are stealing Microsoft 365 accounts by abusing link-wrapping services
techradar.comยท13h
๐ŸŽซKerberos Attacks
Wake-on-LAN Using Cloud Functions
mihai.fmยท16hยท
Discuss: Hacker News
๐Ÿ”ŒOffline-first Apps
Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical)
seclists.orgยท2d
๐Ÿ’ฃZIP Vulnerabilities
Windows Authentication Monitoring
infosecwriteups.comยท1d
๐Ÿ”NTLM Archaeology
Federated Credential Management (FedCM)
ciamweekly.substack.comยท17hยท
Discuss: Substack
๐Ÿ”’Privacy Archives
Akira Ramps Up Assault on SonicWall Firewalls, Suggesting Zero-Day
darkreading.comยท16h
๐Ÿ”“Hacking
Bouncing on trampolines to run eBPF programs
bootlin.comยท19m
๐Ÿ”eBPF
Those Titles the AI Bot Thought I Had Written
bsdly.blogspot.comยท33mยท
Discuss: bsdly.blogspot.com
๐ŸงชArchive Fuzzing
Legacy May Kill, (Sun, Aug 3rd)
isc.sans.eduยท1d
๐ŸŒDNS Security
6 Ways to prevent a man-in-the-middle (MitM) attack
fingerprint.comยท4d
๐ŸŒDNS Security
Beneath the Belly of the Latest BlueNoroff Attack: A DNS Investigation
circleid.comยท7h
๐ŸŒDNS Security
Autonomous Penetration Testing: Solving Capture-the-Flag Challenges with LLMs
arxiv.orgยท3h
โšกProof Automation
SEP-XXXX: Server-Side Authorization Management with Client Session Binding
github.comยท14hยท
Discuss: Hacker News
โšกgRPC
Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024
securityaffairs.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
SIEVE โ€” a better algorithm than LRU?
blog.apnic.netยท2h
๐Ÿ’จCache Analysis
One Third of the Web Will Stop Working in 4 Days
lowendbox.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท20h
โš—๏ธAlgebraic Coding
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
sentinelone.comยท21h
๐Ÿฆ Malware Analysis
AI Clouds Are Flying Blind: The Illusion of Runtime Protection
thenewstack.ioยท12h
๐Ÿ”eBPF
Loading...Loading more...
AboutBlogChangelogRoadmap