BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท3h
๐DNS Security
Flag this post
Tricks, Treats, and Terabits
๐ฃ๏ธBGP Hijacking
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.comยท1d
๐ก๏ธARM TrustZone
Flag this post
Vulnerability Analysis: Deconstructing the $147k Sharwa Finance Exploit
blog.verichains.ioยท13h
๐Hash Chains
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท8h
๐ฆContainer Security
Flag this post
Dentsuโs US subsidiary Merkle hit by cyberattack, staff and client data exposed
securityaffairs.comยท12h
๐กCybersecurity
Flag this post
InfoSec News Nuggets 10/30/2025
aboutdfir.comยท8h
๐Hacking
Flag this post
Relevant โ TryHackMe Room Walkthrough
infosecwriteups.comยท12h
๐ฏNTLM Attacks
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.comยท6h
๐Hacking
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comยท2h
๐ฃ๏ธBGP Hijacking
Flag this post
Claroty Patches Authentication Bypass Flaw
darkreading.comยท48m
๐Hacking
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท4h
๐BGP Security
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท10h
๐ฆ Parasitic Storage
Flag this post
5 ways to prevent password reset attacks
fingerprint.comยท21h
๐ฏNTLM Attacks
Flag this post
Inside the Star-Studded, Mob-Run Poker Games That Allegedly Steal Millions From Players
wired.comยท10h
๐Hacking
Flag this post
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
theregister.comยท1h
๐Hacking
Flag this post
AI Red Teaming Guide
๐ Homelab Pentesting
Flag this post
You Don't Own Your Reputation
๐ซKerberos History
Flag this post
Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days
news.risky.bizยท1d
๐Hacking
Flag this post
Loading...Loading more...