🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 NTLM Attacks

Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

How PC makers exploited BIOS copyright strings to unlock trial software during the Windows 95 era
techspot.comΒ·10h
πŸ”’Hardware Attestation
Smashing Security podcast #423: Operation Endgame, deepfakes, and dead slugs
grahamcluley.comΒ·6h
πŸ”“Hacking
Critical vulnerability in Citrix Netscaler raises specter of exploitation wave
cybersecuritydive.comΒ·13h
πŸ”“Hacking
How to Speed Up TPRM Approvals with Spectra Assure
reversinglabs.comΒ·17h
πŸ”’Hardware Attestation
The 16 Billion Passwords Panic: What Really Happened and Why It Matters (Or Doesn’t)
blog.elcomsoft.comΒ·2d
πŸ”“Password Cracking
The Dark Side of Azure Identity & Access Management – 5 IAM & Entra ID Security Risks You Can’t Ignore
blog.compass-security.comΒ·1d
πŸ”“LDAP Injection
Microsoft Dependency Has Risks
blog.miloslavhomer.czΒ·9hΒ·
Discuss: Hacker News
πŸ–₯️Self-hosted Infrastructure
IBM Storage Protect Server is vulnerable to authorization bypass attack
ibm.comΒ·1dΒ·
Discuss: Hacker News
πŸ’£ZIP Vulnerabilities
Tiny Deltas, Big Wins: Schema-less Thrift Patching at Planet Scale
hackernoon.comΒ·22h
πŸ“‹Protocol Buffers
This is how you build an AI Ransomware Worm
trufflesecurity.comΒ·2dΒ·
Discuss: Hacker News
πŸ•΅οΈVector Smuggling
What Is DLL Hijacking? Understanding and Preventing the Threat
securityscorecard.comΒ·1d
πŸ›‘οΈeBPF Security
How to Quantify Risk and Communicate Effectively: Step 4 to TruRiskβ„’
blog.qualys.comΒ·14h
🎯Threat Hunting
Disrupting the operations of cryptocurrency mining botnets
securityaffairs.comΒ·19h
🎫Kerberos Attacks
Password-Derived Signature Authentication
github.comΒ·2dΒ·
Discuss: Hacker News
πŸ”’LDAP Security
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.comΒ·17h
🦠Malware Analysis
Bitmasking for Granular Backend RBAC: A Beginner's Guide
dev.toΒ·16hΒ·
Discuss: DEV
πŸ”Homomorphic Encryption
The one-more-re-nightmare compiler (2021)
applied-langua.geΒ·1dΒ·
Discuss: Lobsters, Hacker News, r/programming
πŸ”RegEx Engines
Practical tips to optimize documentation for LLMs, AI agents, and chatbots
biel.aiΒ·1dΒ·
Discuss: Hacker News
πŸ€–Archive Automation
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
darkreading.comΒ·1d
🎫Kerberos Exploitation
Detect Narrative Threats with AI Personas
askrally.comΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Feed Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap