They're in…now what? How to stop lateral movement when the phish bites
runzero.com·19h
🎫Kerberos Attacks
Active Directory Security Tip #12: Kerberos Delegation
adsecurity.org·11h
🎫Kerberos Exploitation
Detection Engineering: Practicing Detection-as-Code – Monitoring – Part 7
blog.nviso.eu·3h
🚨Incident Response
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·1d
🎫Kerberos Exploitation
AI in Cybersecurity: The Ultimate Guide to Threats & Defense in 2025
dev.to·51m·
Discuss: DEV
🎯Threat Hunting
Redis CVE-2025-49844: Use-After-Free may lead to remote code execution
redis.io·2h·
Discuss: Hacker News
Redis Internals
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.com·1h
🔓Hacking
Are Software Registries Inherently Insecure?
developers.slashdot.org·1d
📦Container Security
Adversary TTP Simulation Lab
infosecwriteups.com·5h
🏠Homelab Pentesting
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·18h
🛡️eBPF Security
Automate and Manage Dnsmasq
migus.org·18h·
Discuss: Hacker News
🤖Network Automation
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·2h·
Discuss: Hacker News
🔓Password Cracking
The very simple ways to reduce the risk of being burgled
the-independent.com·1h
🏠Home Automation
Deep Dive: 3 Lazarus RATs Caught in Our DNS Trap
circleid.com·3d
🌐DNS Security
Case Study: How Advance2000 keeps 10K+ users secure with Sophos
news.sophos.com·21h
🎫Kerberos History
Oracle Security Alert Advisory - Kudelski Security Research Center
kudelskisecurity.com·1d
🛡️eBPF Security
6th October – Threat Intelligence Report
research.checkpoint.com·1d
🛡Cybersecurity
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·23h
🔐Cryptographic Archaeology
Salesforce data theft: Cyber gangs blackmail well-known companies on leak site
heise.de·2h
🎫Kerberos Attacks