Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·18h
🔐Cryptographic Archaeology
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·23h
🦠Malware Analysis
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·15h
🎫Kerberos Attacks
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
rapid7.com·17h
🔓Hacking
Active Directory Security Tip #12: Kerberos Delegation
adsecurity.org·6h
🏢Active Directory
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·14h
🛡️eBPF Security
ELA-1534-1 freeipa security update
freexian.com·1d
🛡️eBPF Security
Adversary TTP Simulation Lab
infosecwriteups.com·1h
🏠Homelab Pentesting
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.com·17h
🔓Hacking
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.edu·1d
🎯NTLM Attacks
RediShell: Critical Remote Code Execution
wiz.io·8h·
Discuss: Hacker News
📦Container Security
6th October – Threat Intelligence Report
research.checkpoint.com·21h
🛡Cybersecurity
Scattered Lapsus$ Hunters offering $10 in Bitcoin to 'endlessly harass' execs
theregister.com·15h
🎫Kerberos Attacks
Cyberattackers Exploit Zimbra Zero-Day Via ICS
darkreading.com·10h
🔓Hacking
I'm Building a Browser for Reverse Engineers
nullpt.rs·1d·
🛡️WASM Sandboxing
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·1d
🔓Hacking
A History of Active Directory Security
adsecurity.org·3d
🏺Kerberos Archaeology
Red Hat Consulting breach puts over 5000 high profile enterprise customers at risk — in detail
doublepulsar.com·11h
🎫Kerberos Attacks
AgentSight: Keeping Your AI Agents Under Control with eBPF-Powered System Observability
dev.to·8h·
Discuss: DEV
🔍eBPF
Phishers target 1Password users with convincing fake breach alert
malwarebytes.com·13h
🎯NTLM Attacks