Understanding stealthy BGP hijacking risk in the ROV era
blog.apnic.net·3d
🌐BGP Security
Flag this post
Nylon - Dynamic Routing on WireGuard for Everyone
github.com·3h·
📡BGP Archaeology
Flag this post
Network Scanning with Python: ARP, Port, and DNS Scanner
dev.to·9h·
Discuss: DEV
📡Network Protocol Design
Flag this post
In defense of URL shorteners
blog.rtrace.io·2h
🔍BitFunnel
Flag this post
Winos 4.0 hackers expand to Japan and Malaysia with new malware
securityaffairs.com·7h
🔓Hacking
Flag this post
Understanding DNSSEC: Best Practices and Implementation Challenges
circleid.com·1d
🌐DNS Security
Flag this post
SEO spam and hidden links: how to protect your website and your reputation
securelist.com·1d
🌐WARC Forensics
Flag this post
Threat Intelligence Executive Report – Volume 2025, Number 5
news.sophos.com·1d
🌐DNS Security
Flag this post
Lab: Hide Transit Subnets in IS-IS Networks
blog.ipspace.net·1d
📡Network Protocol Design
Flag this post
HA Kubernetes API server with MetalLB...?
reddit.com·13h·
Discuss: r/kubernetes
📡BGP Archaeology
Flag this post
Testing tricky network services with Linux Namespaces
angelofailla.com·17h·
Discuss: Hacker News
🏠Homelab Pentesting
Flag this post
This Week in Security: F5, SonicWall, and the End of Windows 10
hackaday.com·1d
🔓Hacking
Flag this post
LinkPro: eBPF rootkit analysis
synacktiv.com·4d
🛡️eBPF Security
Flag this post
Hydrolix – The growing threat of residential criminal proxies (June 2025)
hydrolix.io·1d·
Discuss: Hacker News
🏴‍☠️Piracy
Flag this post
Forensics of the past
hexacorn.com·1d
🔍Tape Forensics
Flag this post
The Cost of URL Design
alfy.blog·8h·
Discuss: Hacker News
🔗Hypermedia APIs
Flag this post
Mastering Host Header Injection: Techniques, Payloads and Real-World Scenarios
infosecwriteups.com·2d
🌐DNS Security
Flag this post
“Privacy” and “Prizes”: Rewards from a Malicious Browser Extension
cofense.com·2d
🎫Kerberos Exploitation
Flag this post
The interesting architecture of crt.sh (2018)
lukeshu.com·4h·
Discuss: Hacker News
🗄️PostgreSQL WAL
Flag this post