Registry Analysis
🔍NTLM Archaeology
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
"Trusted Crypto Recovery Experts: My Road With Dexdert Net Pro Recovery "
🗄️Database Recovery
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
🔍NTLM Forensics
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.com·9h
🛡Cybersecurity
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·1d
🛣️BGP Hijacking
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·1d
🎯NTLM Attacks
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·22h
🌳Archive Merkle Trees
Flag this post
How to Hack a Poker Game
wired.com·11h
📼Cassette Hacking
Flag this post
How Cover Whale Scaled Its Developer Platform Beyond an MVP
thenewstack.io·8h
👁️Observatory Systems
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·16h
🔒Language-based security
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
The internet was made for privacy
doctorow.medium.com·3h
🧲Magnetic Philosophy
Flag this post
Loading...Loading more...