Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·12h
🎯Penetration Testing
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🔬Reverse Engineering
Flag this post
Evading AV and EDR solutions
🎯Penetration Testing
Flag this post
Registry Analysis
🔬Reverse Engineering
Flag this post
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
thehackernews.com·1d
🔐Cybersecurity
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·17h
🎯Penetration Testing
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.com·1d
🎯Penetration Testing
Flag this post
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
blogger.com·1d
🔐Cybersecurity
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·1d
🎯Penetration Testing
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.io·1d
🎯Penetration Testing
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.org·1d
🐍Python
Flag this post
Avast Free Antivirus for Mac review: Basic protection, for free
macworld.com·1d
🔐Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🔐Cybersecurity
Flag this post
Vercel Agent can now run AI investigations
vercel.com·14h
🎯Penetration Testing
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
🦈Wireshark
Flag this post
AI scrapers request commented scripts
💉SQL Injection
Flag this post
How to find DNN Software installations on your network
runzero.com·10h
🦈Wireshark
Flag this post
Loading...Loading more...