Route Hijacking, Internet Routing, Network Archaeology, Protocol Analysis

Preventing Internet Route Hijack with SIDRops Technology
ietf.org·2d
🛣️BGP Hijacking
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·8h
🎫Kerberos Attacks
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·11h·
Discuss: Hacker News
🚀Indie Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·14h
🌐DNS Security
Effective Web Scraping with Python: Building a Robust Data Pipeline for Price Monitoring
dev.to·20h·
Discuss: DEV
🕵️Feed Discovery
My BTL1 Review
infosecwriteups.com·18h
🔐Certificate Analysis
HTTP/1.1 must die: Dafydd Stuttard on what this means for enterprise security
portswigger.net·1d
📡BGP Archaeology
The Why of PGP Authentication
articles.59.ca·16h
🔑Cryptographic Protocols
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·18h
🚨Incident Response
Beyond the Classroom: Enhancing Security and Productivity with Jamf Safe Internet
jamf.com·16h
🛡Cybersecurity
Fact check: VPNs are legal in the UK
the-independent.com·13h
🛣️BGP Hijacking
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·1d·
Discuss: Hacker News
🔐Capability Systems
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.com·2d
🌐Network Security
FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.com·16h
🎫Kerberos Exploitation
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·13h
🎯Threat Hunting
A Story About Bypassing Air Canada's In-Flight Network Restrictions
ramsayleung.github.io·21h·
🌐DNS over QUIC
From Toil to Empowerment: Building Self-Service Ingress with GitOps
usenix.org·1d
🕸️Mesh Networking
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
darkreading.com·9h
🔓Hacking
Malware apps posing as free VPNs are on the rise
engadget.com·11h
🛡️eBPF Security
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·2d
🧬PostgreSQL Forensics