Detecting DLL hijacking with machine learning: real-world cases
securelist.com·20h
🦠Malware Analysis
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·16h
🔐Cryptographic Archaeology
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·12h
🎫Kerberos Attacks
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
rapid7.com·15h
🔓Hacking
Active Directory Security Tip #12: Kerberos Delegation
adsecurity.org·4h
🏢Active Directory
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·11h
🛡️eBPF Security
ELA-1534-1 freeipa security update
freexian.com·1d
🛡️eBPF Security
Oracle patches critical E-Business Suite flaw exploited by Cl0p hackers
securityaffairs.com·14h
🔓Hacking
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.edu·1d
🎯NTLM Attacks
6th October – Threat Intelligence Report
research.checkpoint.com·18h
🛡Cybersecurity
RediShell: Critical Remote Code Execution
wiz.io·6h·
Discuss: Hacker News
📦Container Security
Red Stone One Carat — TryHackMe Challenge Write-up
infosecwriteups.com·2d
🛡️CLI Security
Scattered Lapsus$ Hunters offering $10 in Bitcoin to 'endlessly harass' execs
theregister.com·12h
🎫Kerberos Attacks
I'm Building a Browser for Reverse Engineers
nullpt.rs·1d·
🛡️WASM Sandboxing
Cyberattackers Exploit Zimbra Zero-Day Via ICS
darkreading.com·8h
🔓Hacking
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·1d
🔓Hacking
Red Hat Consulting breach puts over 5000 high profile enterprise customers at risk — in detail
doublepulsar.com·8h
🎫Kerberos Attacks
A History of Active Directory Security
adsecurity.org·3d
🏺Kerberos Archaeology
AgentSight: Keeping Your AI Agents Under Control with eBPF-Powered System Observability
dev.to·5h·
Discuss: DEV
🔍eBPF
Phishers target 1Password users with convincing fake breach alert
malwarebytes.com·11h
🎯NTLM Attacks