See the business data leaking onto the dark web with Proton’s Data Breach Observatory
proton.meยท1d
๐Ÿ”“Hacking
Flag this post
OpenSMTPD 7.8.0p0 released with security fixes and improvements
discoverbsd.comยท18h
๐Ÿ”ŒOperating system internals
Flag this post
How to find DNN Software installations on your network
runzero.comยท12h
๐Ÿ›ก๏ธSecurity Headers
Flag this post
Error'd: Once Is Never Enough
thedailywtf.comยท23h
๐ŸงชHardware Fuzzing
Flag this post
End-to-end phishing resistance: Stretch goal or short-term reality?
duo.comยท4d
๐Ÿ”“Hacking
Flag this post
Scam: Inside South-East Asia's Cybercrime Compounds
lrb.co.ukยท2dยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
zdnet.comยท1dยท
Discuss: Hacker News
๐Ÿ”“Open Source Software
Flag this post
Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
securityaffairs.comยท21h
๐Ÿ”“Hacking
Flag this post
A Minor Rant About The Cloudflare UX
taoofmac.comยท11hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
Metasploit Wrap-Up 10/31/2025
rapid7.comยท10h
๐Ÿ›ก๏ธCLI Security
Flag this post
Aisuru Botnet Shifts from DDoS to Residential Proxies
krebsonsecurity.comยท3dยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
Flag this post
Klink Finance Partners with M20 Chain to Expand Web3 Earning Opportunities to Over 6 Million Users
hackernoon.comยท1d
๐Ÿ”—Hypermedia APIs
Flag this post
Security Doesnโ€™t Have to Hurt
docker.comยท17h
๐Ÿ”Capability Security
Flag this post
Brash โ€“ Chromium Browser DoS Attack via Document.title Exploitation
github.comยท3dยท
๐Ÿ”“Hacking
Flag this post
Privacy Risks of 1x Neo Robot
captaincompliance.comยท11hยท
Discuss: Hacker News
๐Ÿ Home Automation
Flag this post
Suspected Chinese snoops weaponize unpatched Windows flaw to spy on European diplomats
theregister.comยท1d
๐Ÿ”“Hacking
Flag this post
Aisuru botnet is behind record 20Tb/sec DDoS attacks
securityaffairs.comยท3d
๐ŸŒDNS Security
Flag this post
Beyond IP lists: a registry format for bots and agents
blog.cloudflare.comยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท9hยท
Discuss: Hacker News
โšกProof Automation
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Ÿ”Quantum Security
Flag this post