Feeds to Scour
SubscribedAll
Beyond Authentication — Exploiting a Nasty IDOR in Profile Update Functionality
infosecwriteups.com·5h
🔓Hacking
Preview
Report Post
How to Protect Your WordPress Site From a Phishing Attack
blog.sucuri.net·5h
📡Feed Security
Preview
Report Post
Splunk in Action: From SPL to PCAP
blogs.cisco.com·23h
🕵️Network Forensics
Preview
Report Post
Storm-0249 Abuses EDR Processes in Stealthy Attacks
darkreading.com·2d
🎫Kerberos Exploitation
Preview
Report Post
It didn’t take long: CVE-2025-55182 is now under active exploitation
securelist.com·2d
🎫Kerberos Exploitation
Preview
Report Post
What Is an Exploit? Vulnerabilities and Threat Mitigation
securityscorecard.com·19h
🔓Hacking
Preview
Report Post
Hackers are pretending to be cops – and tech companies keep falling for it
techspot.com·17h
🔓Hacking
Preview
Report Post
Evaluating GPT-5.2 Thinking: Cryptographic Challenge Case Study
irregular.com·1d·
Discuss: Hacker News
🌳Archive Merkle Trees
Preview
Report Post
Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
unit42.paloaltonetworks.com·2d
🎫Kerberos Exploitation
Preview
Report Post
Black Hat Europe 2025: Reputation matters – even in the ransomware economy
welivesecurity.com·1d
🎫Kerberos History
Preview
Report Post
Bun and done: The second coming of the Shai-Hulud worm
redcanary.com·2d
💿WORM Storage
Preview
Report Post
What Day 2 of the Google x Kaggle AI Agents Intensive Taught Me About MCP Security
dev.to·21h·
Discuss: DEV
🌳Archive Merkle Trees
Preview
Report Post
Half of exposed React servers remain unpatched amid active exploitation
theregister.com·1d
🔓Hacking
Preview
Report Post
Imposter for hire: How fake people can gain very real access
microsoft.com·1d
🚨Incident Response
Preview
Report Post
Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem
grahamcluley.com·2d
🏺Kerberos Archaeology
Preview
Report Post
Critical Gogs zero-day under attack, 700 servers hacked
securityaffairs.com·1d
🔓Hacking
Preview
Report Post
Free Micropatches for Windows Remote Access Connection Manager DoS (0day)
blog.0patch.com·1d·
🎯NTLM Attacks
Preview
Report Post
Unsubscribed Doesn’t Mean Disconnected: The Persistent Risk of Calendar Domains
bitsight.com·1d
📡Feed Security
Preview
Report Post
Cyber Talented Framework, a CTF platform coded with Claude Code.
blogs.tunelko.com·23h
🚀Indie Hacking
Preview
Report Post
Hackers distribute thousands of phishing attacks through Mimecast's secure-link feature
techradar.com
·1d
📡Feed Security
Preview
Report Post