How to join the desync endgame: Practical tips from pentester Tom Stacey
portswigger.netยท7h
๐Ÿ›ฃ๏ธBGP Hijacking
Who controls the Internet and How it works?
binaryigor.comยท1dยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
InfoSec News Nuggets 9/18/2025
aboutdfir.comยท9h
๐Ÿ”“Hacking
DNS security for business: What it is and why it matters
proton.meยท1d
๐ŸŒDNS Security
Secure and Efficient Out-of-band Call Metadata Transmission
arxiv.orgยท1d
๐ŸŒNetworkProtocols
Countering threats to business logic
techradar.comยท9h
๐Ÿ”CBOR
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgยท6hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
HTB Sherlocks: Meerkat Walkthrough
infosecwriteups.comยท15h
๐ŸŽซKerberos Exploitation
How we built a flywheel to steadily improve security for Amazon RDS
aws.amazon.comยท1d
๐Ÿ‘๏ธObservatory Systems
Domain Fronting is Dead. Long Live Domain Fronting!
praetorian.comยท2d
๐Ÿ•ต๏ธDomain Enumeration
Webcast recap: see + secure everything in your OT environment
runzero.comยท1d
๐ŸŒNetwork Security
Current State and Forecasts for Submarine Cable Maintenance
blog.telegeography.comยท9h
๐Ÿ“ฐRSS Archaeology
Collision Course: The Inevitable Convergence of Third Party Risk and Exposure Management
bitsight.comยท2h
๐ŸŽฏThreat Hunting
Design Tradeoffs at the Edge
usenix.orgยท2hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Yes, Your ISP can Detect/Block VPN Connections
reddit.comยท2hยท
Discuss: r/homelab
๐ŸŒNetwork Security
RPKI best practices and lessons learned
blog.apnic.netยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
The huge AI security hole
aardvark.co.nzยท6h
๐Ÿ”“Hacking
Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic
circleid.comยท8h
๐Ÿ•ต๏ธDomain Enumeration
Building Web Servers from First Principles (Part 1)
dev.toยท1dยท
Discuss: DEV
โšกgRPC