The apocalypse above our heads
aardvark.co.nzยท10h
๐Ÿ“กRSS
Flag this post
Why Trump hijacked the .gov domain
theverge.comยท2d
๐Ÿ“กRSS
Flag this post
Simplifying identity security queries with AI
duo.comยท1d
๐ŸขLDAP Forensics
Flag this post
Got this sonuvabitch for FREE
reddit.comยท2hยท
Discuss: r/homelab
๐Ÿ Homelab Archaeology
Flag this post
A leadership vacuum and staff cuts threaten NSA morale, operational strength
nextgov.comยท2dยท
Discuss: Hacker News
๐Ÿ”ŽOSINT Techniques
Flag this post
Ex-Cybersecurity Staff Charged With Moonlighting as Hackers
yro.slashdot.orgยท2d
๐Ÿ”“Hacking
Flag this post
InfoSec News Nuggets 11/04/2025
aboutdfir.comยท2d
๐Ÿ”“Hacking
Flag this post
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework
arxiv.orgยท22h
๐Ÿ”Homomorphic Encryption
Flag this post
Show HN: Yansu, Serious Coding
twitter.comยท1dยท
Discuss: Hacker News
๐Ÿ”ขCoding Theory
Flag this post
AI-based malware makes attacks stealthier and more adaptive
cybersecuritydive.comยท1d
๐Ÿ•ต๏ธVector Smuggling
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Flag this post
CyberSlop โ€” meet the new threat actor, MIT and Safe Security
doublepulsar.comยท3dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
SonicWall blames state hackers for damaging data breach
techradar.comยท16h
๐Ÿ”“Hacking
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
theregister.comยท13h
๐Ÿ”“Password Cracking
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.orgยท22h
๐Ÿ”Vector Forensics
Flag this post
Cybersecurity Burnoutโ€™s Secret Trigger: Lack of Visibility
bitsight.comยท5h
๐ŸŽฏThreat Hunting
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.comยท13h
๐Ÿ“กFeed Security
Flag this post
A Criminology of Machines
arxiv.orgยท22h
๐Ÿ”ฒCellular Automata
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1d
๐ŸŽซKerberos Exploitation
Flag this post
Former cybersecurity firm experts attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.comยท1d
๐Ÿ”“Hacking
Flag this post