Relevant โ€” TryHackMe Room Walkthrough
infosecwriteups.comยท1d
๐ŸŽฏNTLM Attacks
Flag this post
UNC6384 Targets European Diplomatic Entities With Windows Exploit
darkreading.comยท2h
๐Ÿ”“Hacking
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
AI scrapers request commented scripts
cryptography.dogยท6hยท
๐ŸŒDNS Security
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Ransomware gang runs ads for Microsoft Teams to pwn victims
theregister.comยท3h
๐ŸŽซKerberos Attacks
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท20h
๐ŸŒDNS Security
Flag this post
Two Windows vulnerabilities, one a 0-day, are under active exploitation
arstechnica.comยท1h
๐Ÿ”“Hacking
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comยท1d
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท5h
๐Ÿ”“Hacking
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.comยท1d
๐Ÿ”“Hacking
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท3hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
Metasploit Wrap-Up 10/31/2025
rapid7.comยท3h
๐Ÿ›ก๏ธCLI Security
Flag this post
Ransomware hackers are now running Linux encryptors in Windows to stay undetected
techradar.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
NEWS ROUNDUP โ€“ 31st October 2025
digitalforensicsmagazine.comยท11h
๐Ÿ›กCybersecurity
Flag this post