The apocalypse above our heads
aardvark.co.nzยท10h
๐กRSS
Flag this post
Why Trump hijacked the .gov domain
theverge.comยท2d
๐กRSS
Flag this post
Simplifying identity security queries with AI
duo.comยท1d
๐ขLDAP Forensics
Flag this post
Got this sonuvabitch for FREE
๐ Homelab Archaeology
Flag this post
A leadership vacuum and staff cuts threaten NSA morale, operational strength
๐OSINT Techniques
Flag this post
Ex-Cybersecurity Staff Charged With Moonlighting as Hackers
yro.slashdot.orgยท2d
๐Hacking
Flag this post
InfoSec News Nuggets 11/04/2025
aboutdfir.comยท2d
๐Hacking
Flag this post
Auditing M-LLMs for Privacy Risks: A Synthetic Benchmark and Evaluation Framework
arxiv.orgยท22h
๐Homomorphic Encryption
Flag this post
Show HN: Yansu, Serious Coding
๐ขCoding Theory
Flag this post
AI-based malware makes attacks stealthier and more adaptive
cybersecuritydive.comยท1d
๐ต๏ธVector Smuggling
Flag this post
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
๐ก๏ธWASM Security
Flag this post
SonicWall blames state hackers for damaging data breach
techradar.comยท16h
๐Hacking
Flag this post
You'll never guess what the most common passwords are. Oh, wait, yes you will
theregister.comยท13h
๐Password Cracking
Flag this post
SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection
arxiv.orgยท22h
๐Vector Forensics
Flag this post
Cybersecurity Burnoutโs Secret Trigger: Lack of Visibility
bitsight.comยท5h
๐ฏThreat Hunting
Flag this post
Mobile Device Attacks Surge as AI-Powered Threats Amplify Risk
zimperium.comยท13h
๐กFeed Security
Flag this post
A Criminology of Machines
arxiv.orgยท22h
๐ฒCellular Automata
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.comยท1d
๐ซKerberos Exploitation
Flag this post
Former cybersecurity firm experts attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.comยท1d
๐Hacking
Flag this post
Loading...Loading more...