Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท9h
๐ก๏ธeBPF Security
Flag this post
How Cover Whale Scaled Its Developer Platform Beyond an MVP
thenewstack.ioยท12h
๐๏ธObservatory Systems
Flag this post
Notes from RIPE 91
blog.apnic.netยท1d
๐DNS over QUIC
Flag this post
EY 4TB Data Leak
๐Hacking
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐DNS Security
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท14h
๐ต๏ธVector Smuggling
Flag this post
Registry Analysis
๐NTLM Archaeology
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท4h
๐Hacking
Flag this post
The new identity paradigm must be hybrid, not just human
techradar.comยท1d
๐Capability Systems
Flag this post
Planning โ HackTheBox Walkthrough
infosecwriteups.comยท1d
๐ก๏ธCLI Security
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท22h
๐DNS Security
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
๐Reproducible Builds
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐BGP Security
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comยท1d
๐ฃ๏ธBGP Hijacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐ฆ Parasitic Storage
Flag this post
Guide: TLS and QUIC
๐DNS over QUIC
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.comยท1d
๐ณArchive Merkle Trees
Flag this post
The internet was made for privacy
doctorow.medium.comยท7h
๐งฒMagnetic Philosophy
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
๐ฏThreat Hunting
Flag this post
BSD Now 635 covers OpenBSD 7.8 release and enterprise storage
discoverbsd.comยท15h
๐Operating system internals
Flag this post
Loading...Loading more...