Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·23h
🔐Cryptographic Archaeology
Adversary TTP Simulation Lab
infosecwriteups.com·5h
🏠Homelab Pentesting
Show HN: Horcrux: Split files into encrypted fragments for Node and React Native
github.com·5h·
Discuss: Hacker News
🔒Homomorphic Compression
19.5 years in Digital Preservation
aranewprofessionals.wordpress.com·19h
💾Data Preservation
Troops and veterans’ personal information leaked in CPAP Medical data breach
malwarebytes.com·54m
🔓Hacking
The ReD Hat Consulting Breach – An Analysis
digitalforensicsmagazine.com·2h
🔓Hacking
How we trained an ML model to detect DLL hijacking
securelist.com·1d
🔗Binary Similarity
A Global Mining Dataset
tech.marksblogg.com·1d·
Discuss: Hacker News
📦METS Containers
All About PDF Decryption – Discover On Passware Knowledge Base
forensicfocus.com·2h
📄PDF Archaeology
A New Cartridge for an Old Computer
hackaday.com·6h
🕹️Retro Gaming
Chinese Gov't Fronts Trick the West to Obtain Cyber Tech
darkreading.com·21h
🕳️Information Leakage
Tape Library and Show Off
i.redd.it·1d·
Discuss: r/homelab
📼Cassette Archaeology
Free online password generator – simple, customizable, and privacy-conscious
pasgen.online·3h·
Discuss: Hacker News
🔓Password Cracking
A History of Active Directory Security
adsecurity.org·3d
🏺Kerberos Archaeology
Introducing OpenZL: An Open Source Format-Aware Compression Framework
engineering.fb.com·19h·
Modern Compression
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·19h
🎫Kerberos Attacks
LockBit Breach: Insights From a Ransomware Group’s Internal Data
blog.compass-security.com·4h
🎫Kerberos Attacks
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·22h
📦Container Security
Experts reveal tips to read body language ahead of Celebrity Traitors launch
the-independent.com·2h
🔍Text Forensics