Subdomain Discovery and Enumeration: From Noise to Valuable Targets
infosecwriteups.com·1d
🕵️Domain Enumeration
The State of Adversarial Prompts
blog.securitybreak.io·8h
🎯Threat Hunting
From Legal Documents to Knowledge Graphs
neo4j.com·1d·
Discuss: Hacker News
📋Document Grammar
Cariddi: Unleash the Power of Automated Web Reconnaissance!
dev.to·1d·
Discuss: DEV
🌐WARC Mining
Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days
willsroot.io·9h·
🛡️eBPF Security
Check if Your Password Has Been Compromised
cubiclenate.com·1d
🔓Password Cracking
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups
securityaffairs.com·22h
🎫Kerberos Exploitation
No Peeking Ahead: Time-Aware Graph Fraud Detection
towardsdatascience.com·2h
🌳Archive Merkle Trees
Inboxfuscation: Because Rules Are Meant to Be Broken
permiso.io·18h·
Discuss: Hacker News
💣Compression Security
Active Directory Security Tip #1: Active Directory Admins
adsecurity.org·1d
🔒LDAP Security
What is Data Exfiltration and How to Prevent It
securityscorecard.com·1d
🕳️Information Leakage
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.com·3d
🦠Malware Analysis
Open Security News week 37-2025
nocomplexity.com·3h
🔓Hacking
Data Poisoning Attacks
infosecwriteups.com·1d
🔍Vector Forensics
The Security Challenges of HTTP/3 and QUIC – What You Need to Know
medium.com·2h·
Discuss: Hacker News
🌐Network Protocols
Another AI configuration nightmare
markjgsmith.com·13h
🏠Homelab Pentesting
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.com·1d
🔗Data Provenance
Rating 26 years of Java changes
neilmadden.blog·1d·
Discuss: Hacker News
🏗️Compiler Archaeology
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.com·2d
🎫Kerberos Attacks
The Data Backbone of LLM Systems
infoq.com·3d·
Discuss: Lobsters
🔗Constraint Handling