Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
theregister.comยท7h
๐Hacking
Flag this post
AI Red Teaming Guide
๐ Homelab Pentesting
Flag this post
Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days
news.risky.bizยท2d
๐Hacking
Flag this post
API Attack Awareness: Business Logic Abuse โ Exploiting the Rules of the Game
lab.wallarm.comยท1d
๐BGP Security
Flag this post
Notes from RIPE 91
blog.apnic.netยท3h
๐DNS over QUIC
Flag this post
SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructur...
seclists.orgยท1d
๐คEBCDIC Privacy
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.comยท15h
๐ณArchive Merkle Trees
Flag this post
Crypto wasted: BlueNoroffโs ghost mirage of funding and jobs
securelist.comยท2d
๐Indie Hacking
Flag this post
Fake PayPal invoice from Geek Squad is a tech support scam
malwarebytes.comยท13h
๐Binary Similarity
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.comยท1d
๐ฆ Malware Analysis
Flag this post
Infostealer for Windows, macOS and Linux found in ten packages on npm
heise.deยท16h
๐Open Source Software
Flag this post
See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.meยท13h
๐Hacking
Flag this post
EY 4TB Data Leak
๐Hacking
Flag this post
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
unit42.paloaltonetworks.comยท1d
๐ฆ Malware Analysis
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comยท15h
๐Hacking
Flag this post
Deepfake-as-a-Service 2025 โ How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
darknet.org.ukยท2d
๐ผCassette Hacking
Flag this post
Loading...Loading more...