Kerberoasting
blog.cryptographyengineering.comยท1dยท
๐ŸŽฏNTLM Attacks
kioptrix level 1
infosecwriteups.comยท5h
๐Ÿ”eBPF
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comยท1d
๐Ÿฆ Malware Analysis
Beyond the surface - Exploring attacker persistence strategies in Kubernetes
raesene.github.ioยท1h
๐Ÿ“ฆContainer Security
This long-exposed SonicWall flaw is being used to infect organizations with Akira ransomware - so patch now
techradar.comยท19h
๐Ÿ”“Hacking
Notes of cyber inspector: three clusters of threat in cyberspace
securelist.comยท1d
๐Ÿ•ต๏ธPenetration Testing
Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand
theregister.comยท15h
๐ŸŽซKerberos Attacks
Exploiting Authorisation Sprawl Is the New Black
news.risky.bizยท1d
๐Ÿ”“Hacking
'Gentlemen' Ransomware Abuses Vulnerable Driver to Kill Security Gear
darkreading.comยท14h
๐Ÿ”“Hacking
Into the Deep DNS Sea with the JSCEAL Campaign
circleid.comยท1d
๐Ÿ“กDNS Archaeology
Microsoft Store and WinGet: Security Risks for Corporate Environments
blackhillsinfosec.comยท1d
๐Ÿ”“LDAP Injection
US indicts ransomware dev, offers $10 million reward, puts him on most-wanted list
metacurity.comยท1d
๐Ÿ”“Hacking
How An Attacker's Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
huntress.comยท2dยท
Discuss: Hacker News
๐ŸŽฏThreat Hunting
Windows KASLR Bypass โ€“ CVE-2025-53136
crowdfense.comยท18hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Securing AI Workloads in Kubernetes: Why Traditional Network Security Isnโ€™t Enough
tigera.ioยท15h
๐Ÿ‘๏ธObservatory Systems
Attackers abuse ConnectWise ScreenConnect to drop AsyncRAT
securityaffairs.comยท1d
๐Ÿ”“Hacking
The Great NPM Heist โ€“ September 2025
blog.checkpoint.comยท1d
๐ŸŽซKerberos Attacks
Asterisk Security Release 18.26.4
seclists.orgยท3d
๐Ÿ›กCybersecurity
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.chยท5hยท
๐Ÿ›ก๏ธRISC-V Security