Directory Injection, Authentication Bypass, Enterprise Pentesting, AD Enumeration

Feeds to Scour
SubscribedAll
Scoured 15532 posts in 689.9 ms
What is API Security?
securityscorecard.com·16h
📦Container Security
Preview
Report Post
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments
dev.to·1h·
Discuss: DEV
🏠Homelab Pentesting
Preview
Report Post
Designing an Authentication System: A Dialogue in Four Scenes (1997)
web.mit.edu·2h·
Discuss: Hacker News
🔐Capability Systems
Preview
Report Post
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint
microsoft.com·4h
🎯NTLM Attacks
Preview
Report Post
Common Cyber Threats
blackhillsinfosec.com·19h
🛡Cybersecurity
Preview
Report Post
LLM Security and Safety: Insights from Homotopy-Inspired Prompt Obfuscation
arxiv.org·4h
👑Coq Tactics
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·19h
🕵️Penetration Testing
Preview
Report Post
As Strong As Your Weakest Parameter: An AI Authorization Bypass
praetorian.com·17h
🎯Threat Hunting
Preview
Report Post
jgmdev/ddos-deflate: Fork of DDoS Deflate with fixes, improvements and new features.
github.com·7h
🛡️eBPF Security
Preview
Report Post
Call for Participation - ICANN DNSSEC and Security Workshop for the ICANN 85 Community Forum
circleid.com·15h
🌐DNS Security
Preview
Report Post
DNS OverDoS: Are Private Endpoints Too Private?
unit42.paloaltonetworks.com·1d
🌐DNS over QUIC
Preview
Report Post
High-Risk Authentication Bypass Flaw Found in Telnetd
decipher.sc·17h
🎯NTLM Attacks
Preview
Report Post
Automating Privacy Code Reviews by Mapping How Software Handles Personal Data
hackernoon.com·1d
🔐Privacy Codecs
Preview
Report Post
Attackers are getting stealthier – how can defenders stay ahead?
techradar.com
·18h
🎯Threat Hunting
Preview
Report Post
PDFSIDER Malware – Exploitation of DLL Side-Loading for AV and EDR Evasion
securityaffairs.com·1d
🦠Malware Analysis
Preview
Report Post
Cloudflare whacks WAF bypass bug that opened side door for attackers
theregister.com·1d
🔓Hacking
Preview
Report Post
AdGuard VPN protocol goes open-source
adguard-vpn.com·16h·
Discuss: Hacker News
🌐NetworkProtocols
Preview
Report Post
Weaponizing Calendar Invites: How Prompt Injection Bypassed Google Gemini’s Controls
miggo.io·20h·
Discuss: Hacker News
🎫Kerberos Attacks
Preview
Report Post
An Open Source DNS Server For Privacy & Security
technitium.com·3d
🌐DNS Security
Preview
Report Post
Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard -- the POST/Artifact use case
arxiv.org·1d
🧪Protocol Fuzzing
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help