The Secrets of Cyber Security That Experts Don't Share
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Flag this post
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
blackhillsinfosec.com·3d
🎫Kerberos Exploitation
Flag this post
Clerk vs. Auth0 vs. Keycloak vs. FusionAuth
justaftermidnight247.com·3h·
Discuss: Hacker News
🔐Capability Systems
Flag this post
How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·1d
🎯Threat Hunting
Flag this post
IncusOS – A Platform for Modern Virtualization & Containerization Infrastructure
gyptazy.com·1d
💾Proxmox Storage
Flag this post
Making Hosted Control Planes possible with Talos
youtube.com·1d
🏠Homelab Federation
Flag this post
Chasing After RacoonO365 IoCs Using DNS and Domain Intelligence
circleid.com·1d
🕵️Domain Enumeration
Flag this post
This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.com·1d
🔓Hacking
Flag this post
Google Summer of Code 2025 Reports: Using bubblewrap to add sandboxing to NetBSD
blog.netbsd.org·4h
🔒WASM Capabilities
Flag this post
Half life of Frameworks
rsdoiel.github.io·16h
🏗️Compiler Archaeology
Flag this post
Notes from "Tor: From the Dark Web to the Future of Privacy"
evanhahn.com·19h
🧅Tor Networks
Flag this post
How I Found the Worst ASP.NET Vulnerability — A $10K Bug (CVE-2025-55315)
praetorian.com·1d
🛣️BGP Hijacking
Flag this post
SonicWall Firewall Backups Stolen by Nation-State Actor
darkreading.com·1d
🔓Hacking
Flag this post
Expanding CloudGuard: Our Journey to Secure GenAI Apps
blog.checkpoint.com·1d
🏠Homelab Security
Flag this post
VDI, SaaS, and DaaS uncovered: what businesses need to know
techradar.com·9h
❄️Nix Adoption
Flag this post
Workload Identity in a Multi System Environment (Wimse) Architecture
datatracker.ietf.org·1d·
Discuss: Hacker News
🔌Operating system internals
Flag this post
The future is already here. GS UK 2025
colinpaice.blog·4h
🏢IBM Mainframes
Flag this post
[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting
seclists.org·1d
🎫Kerberos Exploitation
Flag this post
Your Network, Your Rules: Why DDoS Protection Finally Works on Your Terms
corero.com·2d
🏠Homelab Federation
Flag this post
Balancer hack analysis and guidance for the DeFi ecosystem
blog.trailofbits.com·20h
🧪Binary Fuzzing
Flag this post