The art and science of effective security storytelling
redcanary.comΒ·22h
πŸ”—Data Provenance
Flag this post
Memento Labs, the ghost of Hacking Team, has returned β€” or maybe it was never gone at all.
securityaffairs.comΒ·15h
πŸ”“Hacking
Flag this post
OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.devΒ·22h
πŸ‘οΈSystem Observability
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nzΒ·1d
🎯NTLM Attacks
Flag this post
Re: A few comments on β€˜age’ (2019)
groups.google.comΒ·16hΒ·
Discuss: Lobsters
πŸ”Archive Encryption
Flag this post
ACM CCS 2025 Spotlight: How Bad Was The Falcon Bug of 2019?
esat.kuleuven.beΒ·3h
πŸ”Cryptographic Archaeology
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.comΒ·1d
πŸ›‘οΈProof-Carrying Archives
Flag this post
Understanding the Worst .NET Vulnerability
andrewlock.netΒ·30mΒ·
Discuss: Hacker News
πŸ›£οΈBGP Hijacking
Flag this post
27th October – Threat Intelligence Report
research.checkpoint.comΒ·1d
πŸ›‘Cybersecurity
Flag this post
Making a Virtual Machine Look like Real Hardware to Malware
hackaday.comΒ·9h
πŸ•ΈοΈWebAssembly
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.comΒ·17h
🎯NTLM Attacks
Flag this post
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
securelist.comΒ·8h
πŸš€Indie Hacking
Flag this post
A Metal Detectorist Found Ancient Roman Coinsβ€”Then Hid Them From Authorities for 8 Years
popularmechanics.comΒ·22h
πŸ—οΈPaleocryptography
Flag this post
Proxmon Backup Server: Attackers can destroy backup snapshots
heise.deΒ·25m
πŸ’ΏBackup Strategies
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.ioΒ·11hΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Flag this post
Researchers exploit OpenAI's Atlas by disguising prompts as URLs
theregister.comΒ·21h
πŸ”“Hacking
Flag this post
Cloud Discovery With AzureHound
unit42.paloaltonetworks.comΒ·3d
🎫Kerberos Exploitation
Flag this post
A Government Data Center
thedailywtf.comΒ·1d
πŸ›‘οΈPreservation Proofs
Flag this post
Vulnerability Management – Process Perspective
blog.nviso.euΒ·3h
πŸ”Capability Systems
Flag this post
Weekly Update 475
troyhunt.comΒ·2d
πŸ”“Hacking
Flag this post