The art and science of effective security storytelling
redcanary.comΒ·22h
πData Provenance
Flag this post
Memento Labs, the ghost of Hacking Team, has returned β or maybe it was never gone at all.
securityaffairs.comΒ·15h
πHacking
Flag this post
OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.devΒ·22h
ποΈSystem Observability
Flag this post
Windowsβ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nzΒ·1d
π―NTLM Attacks
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.beΒ·3h
πCryptographic Archaeology
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.comΒ·1d
π‘οΈProof-Carrying Archives
Flag this post
27th October β Threat Intelligence Report
research.checkpoint.comΒ·1d
π‘Cybersecurity
Flag this post
Making a Virtual Machine Look like Real Hardware to Malware
hackaday.comΒ·9h
πΈοΈWebAssembly
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.comΒ·17h
π―NTLM Attacks
Flag this post
Crypto wasted: BlueNoroffβs ghost mirage of funding and jobs
securelist.comΒ·8h
πIndie Hacking
Flag this post
A Metal Detectorist Found Ancient Roman CoinsβThen Hid Them From Authorities for 8 Years
popularmechanics.comΒ·22h
ποΈPaleocryptography
Flag this post
Proxmon Backup Server: Attackers can destroy backup snapshots
heise.deΒ·25m
πΏBackup Strategies
Flag this post
Researchers exploit OpenAI's Atlas by disguising prompts as URLs
theregister.comΒ·21h
πHacking
Flag this post
Cloud Discovery With AzureHound
unit42.paloaltonetworks.comΒ·3d
π«Kerberos Exploitation
Flag this post
A Government Data Center
thedailywtf.comΒ·1d
π‘οΈPreservation Proofs
Flag this post
Vulnerability Management β Process Perspective
blog.nviso.euΒ·3h
πCapability Systems
Flag this post
Weekly Update 475
troyhunt.comΒ·2d
πHacking
Flag this post
Loading...Loading more...