Subdomain Discovery and Enumeration: From Noise to Valuable Targets
infosecwriteups.com·1d
🕵️Domain Enumeration
The State of Adversarial Prompts
blog.securitybreak.io·5h
🎯Threat Hunting
From Legal Documents to Knowledge Graphs
neo4j.com·1d·
Discuss: Hacker News
📋Document Grammar
Cariddi: Unleash the Power of Automated Web Reconnaissance!
dev.to·1d·
Discuss: DEV
🌐WARC Mining
Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days
willsroot.io·7h·
🛡️eBPF Security
Check if Your Password Has Been Compromised
cubiclenate.com·23h
🔓Password Cracking
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups
securityaffairs.com·19h
🎫Kerberos Exploitation
Inboxfuscation: Because Rules Are Meant to Be Broken
permiso.io·15h·
Discuss: Hacker News
💣Compression Security
Active Directory Security Tip #1: Active Directory Admins
adsecurity.org·1d
🔒LDAP Security
What is Data Exfiltration and How to Prevent It
securityscorecard.com·1d
🕳️Information Leakage
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.com·3d
🦠Malware Analysis
Is anyone here familiar with IIS in Windows Server?
reddit.com·5h·
Discuss: r/homelab
🕵️Domain Enumeration
Data Poisoning Attacks
infosecwriteups.com·1d
🔍Vector Forensics
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.com·1d
🔗Data Provenance
Rating 26 years of Java changes
neilmadden.blog·1d·
Discuss: Hacker News
🏗️Compiler Archaeology
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.com·2d
🎫Kerberos Attacks
The Data Backbone of LLM Systems
infoq.com·2d·
Discuss: Lobsters
🔗Constraint Handling
AI Companies School Like Fish
dbreunig.com·16h
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
NightMARE on 0xelm Street, a guided tour
elastic.co·2d
🧪Binary Fuzzing
Why the best LLMs are not enough for the AI SOC
intezer.com·1d
🎯Threat Hunting