Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·1d
🛣️BGP Hijacking
Flag this post
Show HN: Reggi.net your AI domain companion
reggi.net·18h·
Discuss: Hacker News
📡DNS Archaeology
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.net·18h
🌐DNS Security
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·1d
🎯NTLM Attacks
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
Taking steps to end abusive traffic from cloud providers
anubis.techaro.lol·1h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Building an Intelligent RAG System with Query Routing, Validation and Self-Correction
dev.to·7h·
Discuss: DEV
🔍Information Retrieval
Flag this post
Registry Analysis
windowsir.blogspot.com·6h·
🔍NTLM Archaeology
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
escape.tech·2d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
Week 3 of my Home Lab, Active Directory Account Lockout Policy, Logging & Monitoring
preview.redd.it·3d·
Discuss: r/homelab
🏠Homelab Pentesting
Flag this post
Beyond IP lists: a registry format for bots and agents
blog.cloudflare.com·21h·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.com·1d
🎯Threat Hunting
Flag this post
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
tenable.com·7h
🔐Capability Systems
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·11h
🛡️eBPF Security
Flag this post
The researcher’s desk: CVE-2025-20362
blog.detectify.com·7h
🔓Hacking
Flag this post
How Cover Whale Scaled Its Developer Platform Beyond an MVP
thenewstack.io·8h
👁️Observatory Systems
Flag this post