Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐ก๏ธeBPF Security
Flag this post
Guide: TLS and QUIC
๐DNS over QUIC
Flag this post
Registry Analysis
๐NTLM Archaeology
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comยท1d
๐ฃ๏ธBGP Hijacking
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
๐Reproducible Builds
Flag this post
NEWS ROUNDUP โ 31st October 2025
digitalforensicsmagazine.comยท12h
๐กCybersecurity
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Hacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ณArchive Merkle Trees
Flag this post
French researchers find major flaws in AI age-verification software for porn
euobserver.comยท8h
โ
Archive Validation
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐DNS over QUIC
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐ฆ Malware Analysis
Flag this post
GMDSOFT Tech Letter Vol 15. Analyzing Anti-Forensic Traces Left By Location Spoofing Apps
forensicfocus.comยท11h
๐ง Memory Forensics
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐ฆ Parasitic Storage
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.comยท1d
๐ต๏ธSteganographic Archives
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท1d
๐Hacking
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐ต๏ธVector Smuggling
Flag this post
Loading...Loading more...