From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.com·3h
🦠Malware Analysis
Flag this post
Understanding the Worst .NET Vulnerability
andrewlock.net·1d·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Ransomware hackers are now running Linux encryptors in Windows to stay undetected
techradar.com·2h
🦠Malware Analysis
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·2h
🦠Malware Analysis
Flag this post
Tap-and-Steal: The Rise of NFC Relay Malware on Mobile Devices
zimperium.com·2h
🎫Kerberos Attacks
Flag this post
NEWS ROUNDUP – 29th October 2025
digitalforensicsmagazine.com·9h
🚨Incident Response
Flag this post
Mem3nt0 mori – The Hacking Team is back!
securelist.com·2d
🔓Hacking
Flag this post
10 Security Operations Center Best Practices Every Security Leader Should Know
vmray.com·1h
🎯Threat Hunting
Flag this post
Aisuru botnet is behind record 20Tb/sec DDoS attacks
securityaffairs.com·20h
🌐DNS Security
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.com·1d
🛡️eBPF Security
Flag this post
DNS Server BIND: Danger from Proof-of-Concept Exploit for Security Vulnerability
heise.de·8h
🌐DNS Security
Flag this post
Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days
news.risky.biz·17h
🔓Hacking
Flag this post
Some Notes from RIPE-91
potaroo.net·1d
🌐DNS over QUIC
Flag this post
GoSpoof – Turning Attacks into Intel
blackhillsinfosec.com·3h
🛡️eBPF Security
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·37m·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
North Korea's BlueNoroff Expands Scope of Crypto Heists
darkreading.com·1d
🚀Indie Hacking
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·2d
🎯NTLM Attacks
Flag this post
The art and science of effective security storytelling
redcanary.com·2d
🔗Data Provenance
Flag this post
Corero Network Security Solves Encrypted DDoS Blind Spot for Service Providers and Enterprises
corero.com·1d
🔓LDAP Injection
Flag this post
Claude Pirate: Abusing Anthropic's File API For Data Exfiltration
embracethered.com·1d
🕵️Vector Smuggling
Flag this post