Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Building a Self-Improving RAG System with Smart Query Routing and Answer Validation
dev.toยท7hยท
Discuss: DEV
๐Ÿ”Information Retrieval
Flag this post
B+Tree Index Structures in InnoDB
blog.jcole.usยท2dยท
Discuss: Hacker News
๐Ÿ—ƒ๏ธDatabase Storage
Flag this post
Registry Analysis
windowsir.blogspot.comยท6hยท
๐Ÿ”NTLM Archaeology
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท3h
๐Ÿ”“Hacking
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”Hash Functions
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.comยท4h
๐Ÿ“„Document Digitization
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioยท5h
๐Ÿ“ŸTerminal Forensics
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
๐Ÿ“ŠHomelab Monitoring
Flag this post
MSAB Whitepaper โ€“ Investigating RAM In A Mobile Device
forensicfocus.comยท1d
๐Ÿง Memory Forensics
Flag this post
Taking steps to end abusive traffic from cloud providers
anubis.techaro.lolยท1hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท22h
๐ŸŒณArchive Merkle Trees
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
An introduction to OCI Containers on FreeBSD
freebsdfoundation.orgยท2h
๐Ÿ“ฆMETS Containers
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.comยท9h
๐Ÿ›กCybersecurity
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.comยท50mยท
๐Ÿ—‚Data structures
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท11h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
EY 4TB Data Leak
neosecurity.nlยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post