Attack Blog- 2026 2025  2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DATE

NAME

Info

CATEG.

WEB

28.3.26 The Ghost SPN Attack: Catching Stealthy Kerberoasting Before It's Too Late Using Trellix NDR This study breaks down the 'Ghost SPN' vector, which uses delegated administrative permissions to create temporary exposure windows. Attack blog Trelix
21.3.26 Getting Roasted? Trellix Helix sees through AS-REP Attack This blog demonstrates how Trellix Helix's Advanced Correlation Engine (ACE) identifies AS-REP Roasting attacks based on behavioral patterns and technique fingerprints rather than tool-specific indicators. Attack blog Trelix
24.1.26 DNS OverDoS: Are Private Endpoints Too Private? We discovered an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. In this article, we explore how both intentional and inadvertent acts could result in limited access to Azure resources through the Azure Private Link mechanism. We uncovered this issue while investigating irregular behavior in Azure test environments. Attack blog Palo Alto