Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Guide: TLS and QUIC
moq.devยท7hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
Registry Analysis
windowsir.blogspot.comยท9hยท
๐Ÿ”NTLM Archaeology
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
dev.toยท7hยท
Discuss: DEV
๐Ÿ”„Reproducible Builds
Flag this post
Web PKI Ditches TLS Client Authentication
feistyduck.comยท1dยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Flag this post
NEWS ROUNDUP โ€“ 31st October 2025
digitalforensicsmagazine.comยท12h
๐Ÿ›กCybersecurity
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post
French researchers find major flaws in AI age-verification software for porn
euobserver.comยท8h
โœ…Archive Validation
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท1dยท
Discuss: Substack
๐ŸŒNetworkProtocols
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท4hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
GMDSOFT Tech Letter Vol 15. Analyzing Anti-Forensic Traces Left By Location Spoofing Apps
forensicfocus.comยท11h
๐Ÿง Memory Forensics
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐Ÿ•ต๏ธSteganographic Archives
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท1d
๐Ÿ”“Hacking
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post