Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท1d
๐ŸŽฏPenetration Testing
Flag this post
**Automated Malware Classification using LSTM and Naive Baye
dev.toยท21hยท
Discuss: DEV
๐ŸฆˆWireshark
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท2d
๐Ÿ”ฌReverse Engineering
Flag this post
Herodotus Android Malware Fakes Typing to Evade Detection โ€“ How to Protect Yourself
maketecheasier.comยท6h
๐Ÿ”Cybersecurity
Flag this post
Evading AV and EDR solutions
dev.toยท1dยท
Discuss: DEV
๐ŸŽฏPenetration Testing
Flag this post
Registry Analysis
windowsir.blogspot.comยท1dยท
๐Ÿ”ฌReverse Engineering
Flag this post
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
thehackernews.comยท2d
๐Ÿ”Cybersecurity
Flag this post
Proxy Servers: How They Work and What They Actually Do
blogger.comยท5h
๐ŸฆˆWireshark
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท1d
๐ŸŽฏPenetration Testing
Flag this post
Windows Defender vs Avast: The Better Choice?
forums.anandtech.comยท13h
๐ŸงฑFirewalls
Flag this post
Provably Secure e2ee file transfer CLI (post-quantum-ready)
reddit.comยท13mยท
Discuss: r/webdev
๐Ÿ”’TLS/SSL
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท2d
๐ŸŽฏPenetration Testing
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.comยท2d
๐ŸŽฏPenetration Testing
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioยท2d
๐ŸŽฏPenetration Testing
Flag this post
Exhaustive Guide to Generative and Predictive AI in AppSec
qwiet.aiยท1dยท
Discuss: DEV
๐Ÿ”ฌReverse Engineering
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.orgยท2d
๐ŸPython
Flag this post
AI Poisoning: How Malicious Data Corrupts Large Language Models Like ChatGPT and Claude
blogger.comยท2d
๐Ÿ”Cybersecurity
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท14hยท
Discuss: Hacker News
๐ŸŽฏPenetration Testing
Flag this post