'CitrixBleed 2' Wreaks Havoc as Zero-Day Bug
darkreading.comยท3h
๐ Homelab Pentesting
Flag this post
On Hacking Back
schneier.comยท13h
๐ผCassette Hacking
Flag this post
The rise and fall of Tank the hacker who built the Zeus cybercrime empire
techspot.comยท9h
๐ซKerberos History
Flag this post
AI-driven vulnerability reporting overwhelms OSS maintainers
reversinglabs.comยท9h
๐๏ธObservatory Systems
Flag this post
Donโt Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches
blog.elcomsoft.comยท2d
โ
Archive Fixity
Flag this post
InfoSec News Nuggets 11/12/2025
aboutdfir.comยท11h
๐ซKerberos Exploitation
Flag this post
Critical Triofox bug exploited to run malicious payloads via AV configuration
securityaffairs.comยท1d
๐Indie Hacking
Flag this post
November Patch Tuesday does its chores
news.sophos.comยท2h
๐ฃZIP Vulnerabilities
Flag this post
Ubuntu Server Security Suggestions
๐Secure Boot
Flag this post
Patchday: Intel patches dozens of security vulnerabilities
heise.deยท13h
๐ก๏ธRISC-V Security
Flag this post
You Thought It Was Over? Authentication Coercion Keeps Evolving
unit42.paloaltonetworks.comยท1d
๐ฏNTLM Attacks
Flag this post
Whatโs left to worry (and not worry) about in the F5 breach aftermath
cyberscoop.comยท2d
๐กCybersecurity
Flag this post
Unsupervised Learning NO. 506
newsletter.danielmiessler.comยท8h
๐ต๏ธVector Smuggling
Flag this post
Attackers accelerate, adapt, and automate: Rapid7โs Q3 2025 Threat Landscape Report
rapid7.comยท12h
๐ซKerberos Attacks
Flag this post
Red Flags in Social Media: Why Itโs Vital to Track Them
hackernoon.comยท10h
๐ฐRSS Archaeology
Flag this post
The Anatomy of a Texting Scam
theatlantic.comยท2h
๐ต๏ธVector Smuggling
Flag this post
Split-Second Side Doors: How Bot-Delegated TOCTOU Breaks The CI/CD Threat Model
boostsecurity.ioยท4h
๐งชCBOR Fuzzing
Flag this post
OWASP Top 10: Broken access control still tops app security list
theregister.comยท1d
๐Web Standards
Flag this post
Loading...Loading more...