A 64-bit PCI Adaptec SCSI card
rubenerd.comยท2d
๐Ÿ•ต๏ธOSINT
Flag this post
Submission to the Standing Committee on Public Safety and National Security of Bill C-8
citizenlab.caยท3d
๐Ÿ›กcyber security
Flag this post
Stolen Credentials and Valid Account Abuse Remain Integral to Financially Motivated Intrusions
fortinet.comยท3d
๐Ÿ›กcyber security
Flag this post
What should be included in a data science curriculum for schools?
raspberrypi.orgยท3d
๐Ÿ•ต๏ธOSINT
Flag this post
HTB: Store
0xdf.gitlab.ioยท3d
๐Ÿ›กcyber security
Flag this post
Chinaโ€™s Militia Forces Train to โ€œGet Strongโ€ in the New Era
recordedfuture.comยท4d
๐ŸŽฏThreat Hunting
Flag this post
dovecot >= 2.4 requires manual intervention
archlinux.orgยท2d
๐Ÿ“ŠSIEM
Flag this post
MCP Security: Why the Model Context Protocol May Become 2026โ€™s Most Compromised Service
guidepointsecurity.comยท4d
๐ŸŽฏThreat Hunting
Flag this post
Humans Need Entropy
danielmiessler.comยท5dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Flag this post
Security vulnerabilities in AI-powered web browsers
blog.lukaszolejnik.comยท13h
๐Ÿ“ŠSIEM
Flag this post
The Agentic AI Platform for the Agentic Workforce of the Future
paloaltonetworks.comยท5d
๐ŸŽฏThreat Hunting
Flag this post
Injunctions arenโ€™t helping data leaks
rubenerd.comยท1d
๐Ÿ›กcyber security
Flag this post
Bolstering Cybersecurity Resilience in the Public Sector
trustwave.comยท4d
๐Ÿ›กcyber security
Flag this post
Eventually getting an Android phone
rubenerd.comยท1d
๐Ÿ›กcyber security
Flag this post
Cybersecurity Awareness Month: No Tricks, Just Treats โ€“ Frighteningly Effective Ways to Scare Off Cyber Ghouls
guidepointsecurity.comยท2d
๐ŸŽฏThreat Hunting
Flag this post
The BSD, OpenZFS, and illumos communities
rubenerd.comยท3dยท
Discuss: Hacker News
๐Ÿ•ต๏ธOSINT
Flag this post
When to Use Claude Code Skills vs Commands vs Agents
danielmiessler.comยท3d
๐Ÿ“ŠSIEM
Flag this post
Finding the Master Keys: How to Hunt Malicious Client Secrets in M365
guidepointsecurity.comยท3d
๐Ÿ”Digital Forensics
Flag this post
Cyber Awareness Month: Building Data Security from the Inside Out
fortinet.comยท5d
๐Ÿ›กcyber security
Flag this post
Strategic intelligence at the speed of change
feedly.comยท6d
๐ŸŽฏThreat Hunting
Flag this post