Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·12h
🎯Penetration Testing
Flag this post
**Automated Malware Classification using LSTM and Naive Baye
dev.to·2h·
Discuss: DEV
🦈Wireshark
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🔬Reverse Engineering
Flag this post
Evading AV and EDR solutions
dev.to·20h·
Discuss: DEV
🎯Penetration Testing
Flag this post
Registry Analysis
windowsir.blogspot.com·14h·
🔬Reverse Engineering
Flag this post
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
thehackernews.com·1d
🔐Cybersecurity
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·17h
🎯Penetration Testing
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.com·1d
🎯Penetration Testing
Flag this post
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
blogger.com·1d
🔐Cybersecurity
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.com·1d
🎯Penetration Testing
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.io·1d
🎯Penetration Testing
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
qwiet.ai·18h·
Discuss: DEV
🔬Reverse Engineering
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.org·1d
🐍Python
Flag this post
Avast Free Antivirus for Mac review: Basic protection, for free
macworld.com·1d
🔐Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·7h
🔐Cybersecurity
Flag this post
Looking for Demarc PureSecure Linux version.
preview.redd.it·16h·
Discuss: r/linux
🐧Linux
Flag this post
Vercel Agent can now run AI investigations
vercel.com·14h
🎯Penetration Testing
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·15h·
Discuss: Hacker News
🦈Wireshark
Flag this post
AI scrapers request commented scripts
cryptography.dog·11h·
💉SQL Injection
Flag this post
How to find DNN Software installations on your network
runzero.com·10h
🦈Wireshark
Flag this post