How I found an unauthenticated goldmine of PII
infosecwriteups.com·7h
🔓Hacking
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
How OpenTelemetry Works: Tracing, Metrics and Logs on Kubernetes
thenewstack.io·1d
👁️Observatory Systems
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·8h
🚨Incident Response
Wallarm: API Security Platform of the Year 2025
lab.wallarm.com·7h
🔌Interface Evolution
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·3h
🎯Threat Hunting
From Passwords to Passkeys
ssg.dev·1d·
Discuss: Hacker News
🔓Hacking
How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape
circleid.com·1d
📡DNS Archaeology
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·3h
📊Homelab Monitoring
Advice on domains, subdomains, and SSL in homelab for external access
reddit.com·8h·
Discuss: r/homelab
🏠HomeLab
Preventing Internet Route Hijack with SIDRops Technology
ietf.org·2d
🛣️BGP Hijacking
A disenshittification moment from the land of mass storage
doctorow.medium.com·7h
🧲Magnetic Philosophy
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·5h
🔓Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·4h
🌐DNS Security
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Metasploit Wrap Up 10/09/2025
rapid7.com·23h
🛡️eBPF Security
Phishing Protection: Tools SOC Teams Trust in 2025 – An Ultimate Guide
vmray.com·2d
🎯Threat Hunting
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·4d
🎫Kerberos Attacks
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
hackernoon.com·1d
🚀Indie Hacking