Modern Perfect Hashing
🧪Binary Fuzzing
Flag this post
Millions of passengers possibly affected by cyber breach at Dublin Airport supplier
techradar.com·3h
🛡Cybersecurity
Flag this post
InnoGate: Anti-Piracy Research Discovery Platform with AI-Powered RAG and Auth0 FGA
🔌Archive APIs
Flag this post
27th October – Threat Intelligence Report
research.checkpoint.com·4h
🛡Cybersecurity
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
Let's Help NetBSD Cross the Finish Line Before 2025 Ends
discoverbsd.com·5h
🔌Operating system internals
Flag this post
Phishing scam uses fake death notices to trick LastPass users
malwarebytes.com·55m
🎯NTLM Attacks
Flag this post
Learning osquery
blog.devops.dev·2h
🔌Operating system internals
Flag this post
The art and science of effective security storytelling
redcanary.com·2h
🔗Data Provenance
Flag this post
Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
news.risky.biz·13h
🔓Hacking
Flag this post
QAE-BAC: Achieving Quantifiable Anonymity and Efficiency in Blockchain-Based Access Control with Attribute
arxiv.org·11h
🌳Archive Merkle Trees
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·12h
🎫Kerberos Exploitation
Flag this post
Bytes over DNS, (Mon, Oct 27th)
isc.sans.edu·6h
🌐DNS Security
Flag this post
How to Measure a Company’s Cyber Risk with the Breach Susceptibility Indicator
securityscorecard.com·2h
🎯Threat Hunting
Flag this post
Satellite Snooping Reveals Sensitive Unencrypted Data
hackaday.com·4h
🕳️Information Leakage
Flag this post
Attackers can bypass authentication in Dell Storage Manager
heise.de·5h
🔓Hacking
Flag this post
Linux variant of Qilin Ransomware targets Windows via remote management tools and BYOVD
securityaffairs.com·4h
🎫Kerberos Exploitation
Flag this post
Loading...Loading more...