Feeds to Scour
SubscribedAll
Scoured 11801 posts in 470.7 ms
Command and Control & Tunnelling via DNS
infosecwriteups.comยท6h
๐ŸŒDNS Security
Preview
Report Post
How I Built a RAG System That Actually Understands Business Metrics (Part 1: Foundation)
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠLearned Metrics
Preview
Report Post
Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations
news.sophos.comยท7h
๐Ÿ›ก๏ธeBPF Security
Preview
Report Post
Show HN: I built a fast cross-platform CLI network scanner via Python
github.comยท2hยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Preview
Report Post
Have You Seen My Domain Controller?
blogs.cisco.comยท3d
๐ŸŽซKerberos History
Preview
Report Post
I built the software I always wanted for my homelab and now i'm sharing it. Announcing public preview of Sando (Security AND Dhcp Offer).
reddit.comยท7hยท
Discuss: r/homelab
๐Ÿ Homelab Pentesting
Preview
Report Post
SASE Meets Edge AI: Why Security Will Be Decided in the First Millisecond
hackernoon.comยท8h
๐ŸŒŠStreaming Systems
Preview
Report Post
NEWS ROUNDUP โ€“ 15th December 2025
digitalforensicsmagazine.comยท4h
๐ŸšจIncident Response
Preview
Report Post
Generating and using Let's Encrypt wildcard certificates with certโ€‘manager
chuniversiteit.nlยท5hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Preview
Report Post
Tier list of Linux security mechanisms (2024)
blog.ce9e.orgยท1dยท
Discuss: Lobsters
๐Ÿ›ก๏ธCLI Security
Preview
Report Post
The cathedral, the bazaar, and statistical workflow
statmodeling.stat.columbia.eduยท2d
๐Ÿ“ฐRSS Archaeology
Preview
Report Post
Honeypots can help defenders, or damn them if implemented badly
theregister.comยท17h
๐Ÿ”“Hacking
Preview
Report Post
Reducing Domain Gap with Diffusion-Based Domain Adaptation for Cell Counting
arxiv.orgยท11h
๐Ÿ“ŠLearned Metrics
Preview
Report Post
Turning a Tinybox Green v2 into a Private AI Home Server
owain.bearblog.devยท30mยท
Discuss: Hacker News
๐Ÿ HomeLab
Preview
Report Post
Inside the AI-powered assault on SaaS: why identity is the weakest link
techradar.com
ยท1d
๐Ÿ”Capability Systems
Preview
Report Post
15th December โ€“ Threat Intelligence Report
research.checkpoint.comยท3h
๐Ÿ›กCybersecurity
Preview
Report Post
Conill: Rethinking sudo with object capabilities
lwn.netยท1d
๐Ÿ”’WASM Capabilities
Preview
Report Post
Why Monitoring Outbound Connections Is the Fastest Way to Detect a Compromised Linux Server
infosecwriteups.comยท6h
๐Ÿ”eBPF
Preview
Report Post
Speed & Scale: What CISOs Really Need from AI in the SOC
vmray.comยท3d
๐Ÿ”Capability Systems
Preview
Report Post
Python Guide: How to Detect If a Domain Is a Scam
dev.toยท23hยท
Discuss: DEV
๐ŸŒWARC Forensics
Preview
Report Post