Getting Hands-On with Kerbrute: Practical AD Enumeration & Attack Tactics
infosecwriteups.comยท1d
๐Ÿ”’LDAP Security
Millions of (very) private chats exposed by two AI companion apps
malwarebytes.comยท39m
๐Ÿ”“Hacking
RondoDox Botnet targets 56 flaws across 30+ device types worldwide
securityaffairs.comยท4h
๐Ÿ Homelab Pentesting
Malicious NPM Packages Host Phishing Infrastructure Targeting 135
socket.devยท18hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation
CVE-2025-61882: Oracle E-Business Suite Zero-Day Exploited in Clop Extortion Campaigns | Oligo Security
oligo.securityยท15h
๐Ÿ›ก๏ธeBPF Security
HIRE META TECH RECOVERY PRO TO RECOVER YOUR LOST OR STOLEN BITCOIN/ETH/USDT/NFT AND CRYPTOCURRENCY
dev.toยท22hยท
Discuss: DEV
๐ŸงฌPostgreSQL Forensics
Take Note: Cyber-Risks With AI Notetakers
darkreading.comยท22h
๐Ÿ“„Document Digitization
ShinyHunters threatens to release data stolen from dozens of Fortune 500 firms
metacurity.comยท2d
๐ŸŽซKerberos Exploitation
Crimson Collective: A New Threat Group Observed Operating in the Cloud
rapid7.comยท2d
๐ŸŽซKerberos Exploitation
They're inโ€ฆnow what? How to stop lateral movement when the phish bites
runzero.comยท3d
๐Ÿ›ฃ๏ธBGP Hijacking
Discord reveals more on data breach - says 70,000 government ID photos may have been leaked
techradar.comยท1d
๐Ÿ”“Hacking
The ReD Hat Consulting Breach โ€“ An Analysis
digitalforensicsmagazine.comยท3d
๐Ÿ”“Hacking
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
isc.sans.eduยท1d
๐Ÿฆ Malware Analysis
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท20h
๐ŸŒŠStreaming Systems
Investigating targeted โ€œpayroll pirateโ€ attacks affecting US universities
microsoft.comยท21h
๐ŸŽฏNTLM Attacks
Getting Started with AI Hacking Part 2: Prompt Injection
blackhillsinfosec.comยท1d
๐Ÿ•ต๏ธVector Smuggling
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.ioยท18hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
CVE-2025-59397 - Open Web Analytics SQL Injection
seclists.orgยท1d
๐Ÿ›กCybersecurity
Product comparison: Detectify vs. Tenable
blog.detectify.comยท4h
๐ŸŽฏThreat Hunting
Crims had 3-month head start on defenders in Oracle EBS invasion
theregister.comยท16h
๐Ÿ”“Hacking