October 7 – 10, 2025: Bellingcat Online Workshop (16-hour) [Europe-friendly time]
bellingcat.com·5h
🏠Homelab Pentesting
Take Note: Cyber-Risks With AI Notetakers
darkreading.com·15h
🎫Kerberos Attacks
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·12h·
Discuss: Hacker News
🔐Capability Systems
An enough week
blog.mitrichev.ch·9h·
📈Linear programming
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.com·1d
🧬PostgreSQL Forensics
timelinize/timelinize
github.com·4h
⏱️Interval Archives
Man-in-the-Middle Detection
infosecwriteups.com·20h
🎯Threat Hunting
From Ransom to Revenue Loss
paloaltonetworks.com·2d
📡Feed Security
Dozens of Oracle customers impacted by Clop data theft for extortion campaign
cyberscoop.com·13h
🔓Hacking
Forensic Video Workflow with Amped FIVE – Part One: First Steps, Verification and File Considerations
blog.ampedsoftware.com·2d
⚖️Digital Evidence
Hackers exposed government ID photos of 70,000 Discord users
metacurity.com·17h
🛡Cybersecurity
Metasploit Wrap Up 10/09/2025
rapid7.com·9h
🛡️eBPF Security
Command Zero & ReversingLabs: Accelerating SOC Defense
reversinglabs.com·2d
🎯Threat Hunting
DFIR Next Steps: Suspicious Pulseway Use
cybertriage.com·1d
🛡️eBPF Security
Threat Intelligence Report: Daejeon NIRS Data Center Fire Potential DPRK APT Nexus
krypt3ia.wordpress.com·2d
🎯Threat Hunting
E-Evidence: Government wants to facilitate international access to cloud data
heise.de·1d
⚖️Legal Compliance
React: Why We Built an Elite Incident Response Team
blog.cloudflare.com·12h·
Discuss: Hacker News
🌊Streaming Systems
Dual-stage and Lightweight Patient Chart Summarization for Emergency Physicians
arxiv.org·1d
🌊Stream Processing
National Cybersecurity Awareness Month: Exorcising the ghosts of forgotten devices
runzero.com·1d
🛡Cybersecurity
Ensuring Safe and Reliable Updates with Qualys TruRisk™ Manifest Version Control
blog.qualys.com·14h
Archive Fixity