New attack on ChatGPT research agent pilfers secrets from Gmail inboxes
arstechnica.comยท7hยท
Discuss: r/technews
๐ŸขLDAP Forensics
DNS security for business: What it is and why it matters
proton.meยท1d
๐ŸŒDNS Security
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgยท7hยท
Discuss: Hacker News
๐Ÿ”Capability Systems
What is Directory Traversal / Path Traversal Attacks.
infosecwriteups.comยท16h
๐Ÿ’ฃZIP Vulnerabilities
Automate OIDC client secret rotation with Application Load Balancer
aws.amazon.comยท1d
๐ŸŽซKerberos History
Active Directory Forest & Domain Levels
adsecurity.orgยท2d
๐ŸขActive Directory
Connect and secure any private or public app by hostname, not IP โ€” free for everyone in Cloudflare One
blog.cloudflare.comยท9h
๐ŸŒDNS over QUIC
Vulnerabilities threaten HPE Aruba Networking EdgeConnect SD-WAN
heise.deยท14h
๐Ÿ”“Hacking
This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe
wired.comยท8hยท
๐ŸŽซKerberos Exploitation
Lessons in Supply Chain Security from Recent Third-Party Breaches
optiv.comยท2h
๐Ÿ”Capability Systems
Who controls the Internet and How it works?
binaryigor.comยท1dยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Domain Fronting is Dead. Long Live Domain Fronting!
praetorian.comยท2d
๐Ÿ•ต๏ธDomain Enumeration
How weak passwords and other failings led to catastrophic breach of Ascension
arstechnica.comยท9hยท
๐ŸบKerberos Archaeology
DFIR Next Steps: Suspicious AnyDesk Use
cybertriage.comยท9h
๐Ÿ”ŒOperating system internals
Analysis of the ROGUE Agent-Based Automated Web Testing System
dev.toยท2hยท
Discuss: DEV
โšกProof Automation
Underrated Postgres: Build Multi-Tenancy with Row-Level Security
simplyblock.ioยท14hยท
Discuss: Hacker News
๐Ÿ”CBOR
What Is Anti-Phishing? Tools and Tactics to Protect Your Organization
vmray.comยท2d
๐ŸŽฏThreat Hunting
Study Finds IPv6 Adoption Exposes More Residential Devices to Unsolicited Traffic
circleid.comยท8h
๐Ÿ•ต๏ธDomain Enumeration