Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

eBPF Rootkit
synacktiv.com·12h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Building a Windows-based homelab to prep for IT roles. What should I add next to be more employable?
reddit.com·1d·
Discuss: r/homelab
🏠Homelab Pentesting
Flag this post
P2A Security & Governance: Building Enterprise-Ready Guardrails for AWS Process-to-Agentic Systems
dev.to·13h·
Discuss: DEV
🌳Archive Merkle Trees
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·19h
🔓Hacking
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
It’s Not Always DNS: Exploring How Name Resolution Works
cefboud.com·1d·
Discuss: r/programming
🌐DNS Security
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
Agent design is still hard
simonwillison.net·4h
🔐Capability Systems
Flag this post
A $5 Domain Purchase Exposed Critical AI Agent Security Flaws – Deep Dive
pylar.ai·1d·
Discuss: Hacker News
🎫Kerberos Exploitation
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.com·3d
🎯NTLM Attacks
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·11h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·16h
🎫Kerberos Attacks
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.com·1d·
Discuss: r/golang
🎫Kerberos History
Flag this post
D-Link warns of new RCE flaws in end-of-life DIR-878 routers
bleepingcomputer.com·2d·
💣ZIP Vulnerabilities
Flag this post
Back to security basics: phishing
jamf.com·2d
🎫Kerberos Attacks
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Minimal CLI web security scanner
github.com·15h·
Discuss: Hacker News
🛡️Security Headers
Flag this post