The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.com·8h
🎫Kerberos Attacks
How I found an unauthenticated goldmine of PII
infosecwriteups.com·17h
🔓Hacking
How OpenTelemetry Works: Tracing, Metrics and Logs on Kubernetes
thenewstack.io·2d
👁️Observatory Systems
Wallarm: API Security Platform of the Year 2025
lab.wallarm.com·17h
🔌Interface Evolution
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
redcanary.com·1d
🏺Kerberos Archaeology
Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)
dev.to·10h·
Discuss: DEV
🌳Archive Merkle Trees
From Passwords to Passkeys
ssg.dev·2d·
Discuss: Hacker News
🔓Hacking
How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape
circleid.com·1d
📡DNS Archaeology
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.com·13h
🎯Threat Hunting
Creating Real-Time Multimodal AI Pipelines: Scaling File Processing to 50M Daily Uploads
engineering.salesforce.com·5h
🌊Stream Processing
Preventing Internet Route Hijack with SIDRops Technology
ietf.org·2d
🛣️BGP Hijacking
NEWS ROUNDUP – 10th October 2025
digitalforensicsmagazine.com·18h
🚨Incident Response
Advice on domains, subdomains, and SSL in homelab for external access
reddit.com·18h·
Discuss: r/homelab
🏠HomeLab
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.com·13h
📊Homelab Monitoring
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com·15h
🔓Hacking
The silent impersonators: how lookalike domains threaten UK business trust
techradar.com·14h
🌐DNS Security
The Why of PGP Authentication
articles.59.ca·16h
🔑Cryptographic Protocols
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
socket.dev·12h·
Discuss: Hacker News
🚀Indie Hacking
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Metasploit Wrap Up 10/09/2025
rapid7.com·1d
🛡️eBPF Security