They're in…now what? How to stop lateral movement when the phish bites
runzero.com·17h
🎫Kerberos Attacks
Active Directory Security Tip #12: Kerberos Delegation
adsecurity.org·9h
🎫Kerberos Exploitation
Detection Engineering: Practicing Detection-as-Code – Monitoring – Part 7
blog.nviso.eu·1h
🚨Incident Response
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·1d
🎫Kerberos Exploitation
Are Software Registries Inherently Insecure?
developers.slashdot.org·1d
📦Container Security
Automate and Manage Dnsmasq
migus.org·16h·
Discuss: Hacker News
🤖Network Automation
Adversary TTP Simulation Lab
infosecwriteups.com·3h
🏠Homelab Pentesting
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·16h
🛡️eBPF Security
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·30m·
Discuss: Hacker News
🔓Password Cracking
Cross-Modal Content Optimization for Steering Web Agent Preferences
arxiv.org·5h
📊Feed Optimization
6th October – Threat Intelligence Report
research.checkpoint.com·23h
🛡Cybersecurity
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.com·3d
🌐DNS Security
Case Study: How Advance2000 keeps 10K+ users secure with Sophos
news.sophos.com·18h
🎫Kerberos History
Oracle Security Alert Advisory - Kudelski Security Research Center
kudelskisecurity.com·1d
🛡️eBPF Security
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·21h
🔐Cryptographic Archaeology
Phishers target 1Password users with convincing fake breach alert
malwarebytes.com·15h
🎯NTLM Attacks
How we’re securing the AI frontier
blog.google·20h
🎯Threat Hunting
Verizon's I'm A Teapot Error And Other Technology Fails
thecodist.com·13h
🔓Hacking
A History of Active Directory Security
adsecurity.org·3d
🏺Kerberos Archaeology