Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท10hยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
theregister.comยท7h
๐Ÿ”“Hacking
Flag this post
AI Red Teaming Guide
github.comยท11hยท
Discuss: Hacker News
๐Ÿ Homelab Pentesting
Flag this post
Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days
news.risky.bizยท2d
๐Ÿ”“Hacking
Flag this post
API Attack Awareness: Business Logic Abuse โ€” Exploiting the Rules of the Game
lab.wallarm.comยท1d
๐ŸŒBGP Security
Flag this post
Notes from RIPE 91
blog.apnic.netยท3h
๐ŸŒDNS over QUIC
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.comยท15h
๐ŸŒณArchive Merkle Trees
Flag this post
F5 Is Misleading the Market โ€“ The Breach Is Nowhere Near Contained
reporter.deepspecter.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Crypto wasted: BlueNoroffโ€™s ghost mirage of funding and jobs
securelist.comยท2d
๐Ÿš€Indie Hacking
Flag this post
Fake PayPal invoice from Geek Squad is a tech support scam
malwarebytes.comยท13h
๐Ÿ”—Binary Similarity
Flag this post
Beyond IP lists: a registry format for bots and agents
blog.cloudflare.comยท4hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Infostealer for Windows, macOS and Linux found in ten packages on npm
heise.deยท16h
๐Ÿ”“Open Source Software
Flag this post
Designing Smarter Health Checks for Pomerium
pomerium.comยท9hยท
Discuss: Hacker News
๐Ÿ‘๏ธObservatory Systems
Flag this post
See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.meยท13h
๐Ÿ”“Hacking
Flag this post
EY 4TB Data Leak
neosecurity.nlยท14hยท
Discuss: Hacker News
๐Ÿ”“Hacking
Flag this post
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
unit42.paloaltonetworks.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comยท15h
๐Ÿ”“Hacking
Flag this post
Deepfake-as-a-Service 2025 โ€“ How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
darknet.org.ukยท2d
๐Ÿ“ผCassette Hacking
Flag this post