Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Agents Rule of Two: A Practical Approach to AI Agent Security
ai.meta.comยท1hยท
Discuss: Hacker News
โšกProof Automation
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท20h
๐ŸŒDNS Security
Flag this post
Idor โ€” TryHackMe writeup
infosecwriteups.comยท14h
๐ŸŒDNS Security
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท1dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
The researcherโ€™s desk: CVE-2025-20362
blog.detectify.comยท9h
๐Ÿ”“Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐ŸŒBGP Security
Flag this post
Poisoned Search: How Hackers Turn Google Results into Backdoors
lmgsecurity.comยท1d
๐Ÿ”“Hacking
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Taking steps to end abusive traffic from cloud providers
anubis.techaro.lolยท3hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Registry Analysis
windowsir.blogspot.comยท8hยท
๐Ÿ”NTLM Archaeology
Flag this post
French researchers find major flaws in AI age-verification software for porn
euobserver.comยท8h
โœ…Archive Validation
Flag this post
Show HN: rstructor, Pydantic+instructor for Rust
github.comยท4hยท
Discuss: Hacker News
๐Ÿ”’Linear Types
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comยท1d
๐Ÿ”“Hacking
Flag this post