When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
Taking steps to end abusive traffic from cloud providers
anubis.techaro.lol·1h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
Idor — TryHackMe writeup
infosecwriteups.com·12h
🌐DNS Security
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·1d
🛣️BGP Hijacking
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.net·18h
🌐DNS Security
Flag this post
MLPrE -- A tool for preprocessing and exploratory data analysis prior to machine learning model construction
arxiv.org·1d
🎵Audio ML
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.com·9h·
Discuss: Hacker News
🔌Interface Evolution
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
Registry Analysis
windowsir.blogspot.com·6h·
🔍NTLM Archaeology
Flag this post
Week 3 of my Home Lab, Active Directory Account Lockout Policy, Logging & Monitoring
preview.redd.it·3d·
Discuss: r/homelab
🏠Homelab Pentesting
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.com·1d
🔓Hacking
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·1d
📦Container Security
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·1d·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·22h·
Discuss: Hacker News
📡DNS Archaeology
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.com·1h
🔓Hacking
Flag this post
Show HN: rstructor, Pydantic+instructor for Rust
github.com·1h·
Discuss: Hacker News
🔒Linear Types
Flag this post
OpenAI releases ‘Aardvark’ security and patching model
cyberscoop.com·19h
🔓Open Source Software
Flag this post