Getting Hands-On with Kerbrute: Practical AD Enumeration & Attack Tactics
infosecwriteups.comยท1d
๐Ÿ”’LDAP Security
How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape
circleid.comยท1d
๐Ÿ“กDNS Archaeology
Operable Software
ferd.caยท6hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.comยท3h
๐ŸŽฏThreat Hunting
RondoDox Botnet targets 56 flaws across 30+ device types worldwide
securityaffairs.comยท11h
๐Ÿ Homelab Pentesting
Wallarm: API Security Platform of the Year 2025
lab.wallarm.comยท6h
๐Ÿ”ŒInterface Evolution
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท15h
๐Ÿ”—Graph Isomorphism
Local Dynamic DNS?
reddit.comยท1dยท
Discuss: r/homelab
๐ŸŒDNS over QUIC
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.comยท3h
๐Ÿ“ŠHomelab Monitoring
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท4hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท8h
๐ŸšจIncident Response
ITDR vs EDR: What are the Key Differences?
heimdalsecurity.comยท1d
๐ŸŽฏThreat Hunting
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
Detection Engineering: Practicing Detection-as-Code โ€“ Monitoring โ€“ Part 7
blog.nviso.euยท3d
๐ŸšจIncident Response
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท4h
๐ŸŒDNS Security
Preventing Internet Route Hijack with SIDRops Technology
ietf.orgยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
krebsonsecurity.comยท2hยท
Discuss: Hacker News
๐ŸŒDNS Security
Is the End of Detection-Based Security Here?
thenewstack.ioยท3h
๐ŸŽฏThreat Hunting
An enough week
blog.mitrichev.chยท23hยท
๐Ÿ“ˆLinear programming
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics