eBPF Rootkit
synacktiv.com·12h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
The Zero-Bullshit Protocol™ – Hallucination-Proof AI Engineering System: FREE VERSION!
dev.to·1d·
Discuss: DEV
🏠Homelab Pentesting
Flag this post
BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·12h
📼Cassette Hacking
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
Remote Forensic Collection Tools 2025
cybertriage.com·3d
🚨Incident Response
Flag this post
Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing
security.googleblog.com·2d·
🌐WebRTC Archives
Flag this post
Taming the Beast: The Move To Declarative API Validation in Kubernetes - Yongrui Lin, Google
youtube.com·1d
Format Validation
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Product comparison: Detectify vs. Holm Security
blog.detectify.com·2d
🏺ZIP Archaeology
Flag this post
Python Certifi and Custom CAs
zufallsheld.de·13h·
Discuss: Hacker News
🧪CBOR Fuzzing
Flag this post
NEWS ROUNDUP – 21st November 2025
digitalforensicsmagazine.com·1d
🚨Incident Response
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
Minimal CLI web security scanner
github.com·15h·
Discuss: Hacker News
🛡️Security Headers
Flag this post
Management Pseudo-Science
laser-coder.net·13h·
Discuss: Hacker News
📏Code Metrics
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.mov·8h·
Discuss: Hacker News
🔌Operating system internals
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🔎OSINT Techniques
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
nocomplexity.substack.com·17h·
Discuss: Substack
🔗Dependency Resolution
Flag this post
Weekly Update 479
troyhunt.com·1h
🔒Privacy Archives
Flag this post
Why GRC Programs Fail Without Continuous Cyber Risk Intelligence
securityscorecard.com·1d
🕵️Penetration Testing
Flag this post