It’s Not Always DNS: Exploring How Name Resolution Works
cefboud.com·1d·
Discuss: r/programming
🌐DNS Security
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.to·16h·
Discuss: DEV
📡Network Monitoring
Flag this post
I use AI to synthesize all my datasets now
thefulldatastack.substack.com·11h·
Discuss: Substack
🧠Query Planners
Flag this post
eBPF Rootkit
synacktiv.com·13h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Getting Started on Setup - looking to opinons
reddit.com·5h·
Discuss: r/homelab
🖥Home Lab Setup
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔓Hacking
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
RuBee
computer.rip·8h
📻Homebrew Protocols
Flag this post
MENOG 25: Advancing Internet Technologies in the Middle East Report
labs.ripe.net·2d
🛣️BGP Hijacking
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
The OSINT playbook: Find your weak spots before attackers do
welivesecurity.com·2d
🔎OSINT Techniques
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse
sentinelone.com·5d
📡DNS Archaeology
Flag this post
US Border Patrol Is Spying on Millions of American Drivers
wired.com·19h·
Discuss: Hacker News
🕵️Network Forensics
Flag this post
📘 Unsupervised Learning NO. 507
newsletter.danielmiessler.com·3d
🕵️Vector Smuggling
Flag this post
Tracking AI Search Traffic: Why Google Analytics Fails
tryzenith.ai·2h·
Discuss: Hacker News
📊Feed Optimization
Flag this post
Plug-and-Play Firewall for Agents
github.com·5h·
Discuss: Hacker News
Proof Automation
Flag this post
CVSS Is a Little Bit of Risk: Rethinking CVSS in Vulnerability Prioritization
bitsight.com·2d
🔓Hacking
Flag this post