$150K awarded for L1TF Reloaded exploit that bypasses cloud mitigations
securityaffairs.comยท21h
๐ŸŒDNS Security
APNIC / FIRST Security 2 at APNIC 60
blog.apnic.netยท5h
๐ŸŒNetwork Security
MCP Horror Stories: The Drive-By Localhost Breach
docker.comยท18h
๐Ÿ Homelab Pentesting
Daily Bugle โ€” TryHackMe Walkthrough: Joomla Exploitation & Red Hat Privilege Escalation
infosecwriteups.comยท1d
๐Ÿ“ŸTerminal Forensics
Unsupervised Learning NO. 499
newsletter.danielmiessler.comยท12h
๐Ÿ–ฅ๏ธTerminal Renaissance
InfoSec News Nuggets 9/23/2025
aboutdfir.comยท18h
๐Ÿ›กCybersecurity
Iran-Linked Hackers Target Europe With New Malware
darkreading.comยท1d
๐Ÿš€Indie Hacking
Your Vulnerability Scanner Might Be Your Weakest Link
praetorian.comยท1d
๐ŸŽฏNTLM Attacks
Hidden WordPress Backdoors Creating Admin Accounts
blog.sucuri.netยท5h
๐Ÿš€Indie Hacking
ShadowLeak: ChatGPT revealed personal data from emails to attackers
heise.deยท19h
๐Ÿš€Indie Hacking
AI-powered vulnerability detection will make things worse, not better, former US cyber official warns
cybersecuritydive.comยท1d
๐ŸŽฏThreat Hunting
Operation Rewrite: Chinese-Speaking Threat Actors Deploy BadIIS in a Wide Scale SEO Poisoning Campaign
unit42.paloaltonetworks.comยท1dยท
๐ŸŒWARC Forensics
Wireless Blind Spots: The Hidden Risk to AI Data
bastille.netยท16h
๐Ÿ“ŠHomelab Monitoring
SonicWall releases rootkit-busting firmware update following wave of attacks
theregister.comยท12h
๐Ÿ”’Secure Boot
Broken Trust: Fixed Supermicro BMC Bug Gains a New Life in Two New Vulnerabilities
binarly.ioยท13h
๐Ÿ›ก๏ธRISC-V Security
Why Developers Should Care About Removing Personal Data from Google
bugfender.comยท1d
๐Ÿ”คEBCDIC Privacy
Threat actors turning to MFA bypass, USB malware and supply chain attacks
scworld.comยท14hยท
Discuss: Hacker News
๐Ÿ”’WASM Capabilities
Defusing Cloud Misconfiguration Risk: Finding and Fixing Hidden Cloud Security Flaws
tenable.comยท18h
๐Ÿ‘๏ธObservatory Systems