Subdomain Discovery and Enumeration: From Noise to Valuable Targets
infosecwriteups.com·1d
🕵️LDAP Enumeration
Is anyone here familiar with IIS in Windows Server?
reddit.com·3h·
Discuss: r/homelab
🏢Active Directory
The State of Adversarial Prompts
blog.securitybreak.io·3h
🎯Threat Hunting
Service Discovery: The Backbone of Modern Distributed Systems day 50 of system design
dev.to·1d·
Discuss: DEV
🏠Homelab Orchestration
Active Directory Security Tip #1: Active Directory Admins
adsecurity.org·1d
🔒LDAP Security
A New Method for Estimating P2P Network Size
eli.sohl.com·1d·
Discuss: Hacker News
📊Count-Min Sketch
Into the Deep DNS Sea with the JSCEAL Campaign
circleid.com·3d
📡DNS Archaeology
Why the best LLMs are not enough for the AI SOC
intezer.com·1d
🎯Threat Hunting
Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days
willsroot.io·4h·
🛡️eBPF Security
Check if Your Password Has Been Compromised
cubiclenate.com·20h
🔓Password Cracking
Migrating from docker to podman
codito.in·5h
📦Container Security
Show HN: Free AI Business Name Generator and Domain Avalibility
namegator.lovable.app·1d·
Discuss: Hacker News
📡DNS Archaeology
kioptrix level 1
infosecwriteups.com·2d
🔍eBPF
Enhance video understanding with Amazon Bedrock Data Automation and open-set object detection
aws.amazon.com·2d
🎬Video Codecs
How DNS Actually Works
blog.algomaster.io·3d
🌐DNS Security
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.com·1d
🔗Data Provenance
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.com·3d
🦠Malware Analysis
Unlock the Power of Voice AI: Secure and Scalable with ENSI
dev.to·9h·
Discuss: DEV
🎙️Whisper
Cyber Essentials Explained – And How Heimdal Helps You Pass and Stay Compliant
heimdalsecurity.com·1d
🔒Secure Boot
Cariddi: Unleash the Power of Automated Web Reconnaissance!
dev.to·22h·
Discuss: DEV
🌐WARC Mining