Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·1d
🛣️BGP Hijacking
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.net·18h
🌐DNS Security
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·1d
🎯NTLM Attacks
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Building an Intelligent RAG System with Query Routing, Validation and Self-Correction
🔍Information Retrieval
Flag this post
Registry Analysis
🔍NTLM Archaeology
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
We discovered over 2k vulns and PII in apps built with vibe coding platforms
🏺ZIP Archaeology
Flag this post
Week 3 of my Home Lab, Active Directory Account Lockout Policy, Logging & Monitoring
🏠Homelab Pentesting
Flag this post
U.S. CISA adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔓Hacking
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.com·1d
🎯Threat Hunting
Flag this post
Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness
tenable.com·7h
🔐Capability Systems
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·11h
🛡️eBPF Security
Flag this post
The researcher’s desk: CVE-2025-20362
blog.detectify.com·7h
🔓Hacking
Flag this post
How Cover Whale Scaled Its Developer Platform Beyond an MVP
thenewstack.io·8h
👁️Observatory Systems
Flag this post
Loading...Loading more...