Attack Blog- 2026 2025 2024 2023 2022 2021 2020 2019 2018
APT blog Attack blog BigBrother blog BotNet blog Cyber blog Cryptocurrency blog Exploit blog Hacking blog ICS blog Incident blog IoT blog Malware blog OS Blog Phishing blog Ransom blog Safety blog Security blog Social blog Spam blog Vulnerebility blog
DATE | NAME | Info | CATEG. | WEB |
| 28.3.26 | The Ghost SPN Attack: Catching Stealthy Kerberoasting Before It's Too Late Using Trellix NDR | This study breaks down the 'Ghost SPN' vector, which uses delegated administrative permissions to create temporary exposure windows. | Attack blog | Trelix |
| 21.3.26 | Getting Roasted? Trellix Helix sees through AS-REP Attack | This blog demonstrates how Trellix Helix's Advanced Correlation Engine (ACE) identifies AS-REP Roasting attacks based on behavioral patterns and technique fingerprints rather than tool-specific indicators. | Attack blog | Trelix |
| 24.1.26 | DNS OverDoS: Are Private Endpoints Too Private? | We discovered an aspect of Azure’s Private Endpoint architecture that could expose Azure resources to denial of service (DoS) attacks. In this article, we explore how both intentional and inadvertent acts could result in limited access to Azure resources through the Azure Private Link mechanism. We uncovered this issue while investigating irregular behavior in Azure test environments. | Attack blog | Palo Alto |