Nimbus Manticore Deploys New Malware Targeting Europe
research.checkpoint.comยท7h
๐ŸŽซKerberos Exploitation
Show HN: A minimalist, encrypted knowledge platform for solo devs and founders
orbivon.comยท3hยท
Discuss: Hacker News
โœ…Document Verification
How I Glued Together OpenWebUI, Supabase, and Cloudflare to Build a SaaS in a Weekend
dev.toยท2dยท
Discuss: DEV
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
PHP Documentation Audit Complete!
ostif.orgยท6h
๐Ÿ”“Open Source Software
Lost Tools of the Web: FrontPage, Dreamweaver, and Netscape Composer
brajeshwar.comยท20h
๐ŸŒWeb Standards
Daily Bugle โ€” TryHackMe Walkthrough: Joomla Exploitation & Red Hat Privilege Escalation
infosecwriteups.comยท7h
๐Ÿ”“Hacking
Steam game removed after cryptostealer takes over $150K
theverge.comยท7m
๐ŸŽซKerberos Attacks
The story of Musium
ruudvanasseldonk.comยท4hยท
๐Ÿ’ฟFLAC Archaeology
What was the first bug bounty program offered by a major tech company?
techspot.comยท56m
๐ŸŽซKerberos History
ChatGPT solves CAPTCHAs if you tell it they’re fake
malwarebytes.comยท6h
โšกProof Automation
Hackers are using GPT-4 to build a virtual assistant - here's what we know
techradar.comยท3h
๐Ÿฆ Malware Analysis
Lab notes #074 Focused in a direction
interjectedfuture.comยท4h
โš™๏ธProof Engineering
Open-source security analysis with Gemini CLI
github.comยท2hยท
Discuss: Hacker News
๐Ÿ›ก๏ธCLI Security
Steps Towards a Web Without the Internet
ajroach42.comยท1dยท
Discuss: Hacker News
๐Ÿ“žWebRTC
A Lookback at Workers Launchpad and a Warm Welcome to Cohort #6
blog.cloudflare.comยท7hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Inside Sentryโ€™s Hackweek: An excuse to break things
blog.sentry.ioยท20hยท
Discuss: Hacker News
๐Ÿ›ก๏ธWebAssembly Security
AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn
yro.slashdot.orgยท23h
๐Ÿ”“Hacking
A Deep Dive Into the GreedyBear Attack
circleid.comยท3h
๐ŸŽซKerberos Attacks
rpki-client 9.6 released
bsdsec.netยท1d
๐ŸบZIP Archaeology
Real-time Web Analytics with GoAccess
joshtronic.comยท1d
๐ŸŒWARC Forensics