Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·17h
🦠Malware Analysis
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.com·1d
🎯Threat Hunting
Flag this post
Breaking into GitLab: Attacking and Defending Self-Hosted CI/CD Environments
risk3sixty.com·16h·
Discuss: Hacker News
📦Container Security
Flag this post
Port Scan Resulting In Large Data Transfer
reddit.com·1d·
Discuss: r/homelab
📦Container Security
Flag this post
NEWS ROUNDUP – 29th October 2025
digitalforensicsmagazine.com·2d
🚨Incident Response
Flag this post
Millions Impacted by Conduent Data Breach
securityweek.com·17h·
Discuss: Hacker News
🔓Hacking
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·1d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
How Android provides the most effective protection to keep you safe from mobile scams
security.googleblog.com·15h·
🛡️ARM TrustZone
Flag this post
Beyond IP lists: a registry format for bots and agents
blog.cloudflare.com·9h·
Discuss: Hacker News
🌳Archive Merkle Trees
Flag this post
WannaCry: When Crypto Was on Most Screens Worldwide
hackernoon.com·20h
🌳Archive Merkle Trees
Flag this post
Designing Smarter Health Checks for Pomerium
pomerium.com·15h·
Discuss: Hacker News
👁️Observatory Systems
Flag this post
Do you know what really happens when you run kubectl apply?
medium.com·1d
📦Container Security
Flag this post
Anatomy of a cyberattack with a hangover: How Japan was left without beer
english.elpais.com·18h
🔓Hacking
Flag this post
Web PKI Ditches TLS Client Authentication
feistyduck.com·19h·
Discuss: Hacker News
🔐PKI Archaeology
Flag this post
27th October – Threat Intelligence Report
research.checkpoint.com·3d
🛡Cybersecurity
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·19h
λLambda Formalization
Flag this post
Exploring Cloud Key Management Options
devops.com·22h
🔐Archive Encryption
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·1d·
Discuss: Hacker News
📦Package Managers
Flag this post
How Google, Amazon, and CrowdStrike broke millions of systems
newsletter.techworld-with-milan.com·16h·
👁️Observatory Systems
Flag this post
The Backbone Breaker Benchmark: Testing the Real Security of AI Agents
lakera.ai·16h·
Discuss: Hacker News
🎯Threat Hunting
Flag this post