BadAudio malware: how APT24 scaled its cyberespionage through supply chain attacks
securityaffairs.com·15h
📼Cassette Hacking
Flag this post
Cryptomator Desktop 1.18.0 is here!
🏺ZIP Archaeology
Flag this post
14.03 The Workshop
johnnydecimal.com·1d
⚔️Lean Tactics
Flag this post
what's a simple command or script that felt like a magic trick once you learned it?
📟Terminal Forensics
Flag this post
Show HN: Onlymaps, a Python Micro-ORM
🧩SQLite Extensions
Flag this post
Pocket8086 – An handheld x86 retro computer with an XT-class 8086/V30 CPU running DOS 6.22 or Windows 3.0
cnx-software.com·22h
🎮Gameboy Emulation
Flag this post
Obtaining the Citrix Cleanup Tool
kcore.org·1d
🏺Format Archaeology
Flag this post
Press a button and this SSD will self-destruct with all your data
theverge.com·1d
🦠Parasitic Storage
Flag this post
Defensive Technology: Ransomware Data Recovery
textslashplain.com·3d
🏺ZIP Archaeology
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
rpki-client seeks €300K in funding by 2026 to sustain development
discoverbsd.com·2d
🔌Operating system internals
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·18h
🎫Kerberos Attacks
Flag this post
Microsoft named a Leader in the Gartner® Magic Quadrant™ for Access Management for the ninth consecutive year
microsoft.com·1d
🏺Kerberos Archaeology
Flag this post
Installing FreeBSD 15 on my desktop
🐡OpenBSD
Flag this post
Loading...Loading more...