eBPF Rootkit
🛡️eBPF Security
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·19h
🔓Hacking
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·1d
🔤EBCDIC Privacy
Flag this post
[REVIVE-SA-2025-004] Revive Adserver Vulnerabilities
seclists.org·3d
🎫Kerberos Exploitation
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
The Black Friday Cyber Crime Economy: Surge in Fraudulent Domains and eCommerce Scams
blog.checkpoint.com·2d
🕵️Domain Enumeration
Flag this post
A $5 Domain Purchase Exposed Critical AI Agent Security Flaws – Deep Dive
🎫Kerberos Exploitation
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
AdGuard DNS: new mobile app promises faster DNS-based content blocking
ghacks.net·3d
🌐DNS over QUIC
Flag this post
Bulletproof Hosting Providers Targeted by Law Enforcement
heise.de·2d
🎫Kerberos Exploitation
Flag this post
Microsoft named a Leader in the Gartner® Magic Quadrant™ for Access Management for the ninth consecutive year
microsoft.com·1d
🏺Kerberos Archaeology
Flag this post
Back to security basics: phishing
jamf.com·2d
🎫Kerberos Attacks
Flag this post
Plug-and-Play Firewall for Agents
⚡Proof Automation
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Loading...Loading more...