FBI seized domains for the BreachForums hacking forum operated by ShinyHunters
metacurity.comยท6h
๐ŸŽซKerberos Exploitation
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท4hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
Getting Hands-On with Kerbrute: Practical AD Enumeration & Attack Tactics
infosecwriteups.comยท1d
๐Ÿ”’LDAP Security
DraftKings thwarts credential stuffing attack, but urges password reset and MFA
securityaffairs.comยท2d
๐Ÿ”“Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท4h
๐ŸŒDNS Security
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท7h
๐Ÿ”“Hacking
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.securityยท21h
๐Ÿ›ก๏ธeBPF Security
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
krebsonsecurity.comยท2hยท
Discuss: Hacker News
๐ŸŒDNS Security
โ€œPayroll Pirateโ€ phishing scam that takes over Workday accounts steals paychecks
arstechnica.comยท1h
๐ŸŽฏNTLM Attacks
Take Note: Cyber-Risks With AI Notetakers
darkreading.comยท1d
๐Ÿ“„Document Digitization
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
Crimson Collective: A New Threat Group Observed Operating in the Cloud
rapid7.comยท2d
๐ŸŽซKerberos Exploitation
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.ioยท4hยท
๐Ÿ”“Open Source Software
They're inโ€ฆnow what? How to stop lateral movement when the phish bites
runzero.comยท4d
๐Ÿ›ฃ๏ธBGP Hijacking
HIRE META TECH RECOVERY PRO TO RECOVER YOUR LOST OR STOLEN BITCOIN/ETH/USDT/NFT AND CRYPTOCURRENCY
dev.toยท1dยท
Discuss: DEV
๐ŸงฌPostgreSQL Forensics
RondoDox botnet fires 'exploit shotgun' at nearly every router and internet-connected home device
theregister.comยท20h
๐Ÿ”“Hacking
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท3d
๐Ÿ”“Hacking
Getting Started with AI Hacking Part 2: Prompt Injection
blackhillsinfosec.comยท2d
๐Ÿ•ต๏ธVector Smuggling
The ClickFix Factory: First Exposure of IUAM ClickFix Generator
unit42.paloaltonetworks.comยท2d
๐Ÿ”BitFunnel