NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท12h
๐ŸšจIncident Response
Activation Alchemist: Sculpting Stability with Functional Signatures
dev.toยท3hยท
Discuss: DEV
๐Ÿ”Concolic Testing
Getting Hands-On with Kerbrute: Practical AD Enumeration & Attack Tactics
infosecwriteups.comยท1d
๐Ÿ”’LDAP Security
The silent impersonators: how lookalike domains threaten UK business trust
techradar.comยท9h
๐ŸŒDNS Security
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.orgยท2dยท
Discuss: Hacker News
๐Ÿ”’Language-based security
The Golden Scale: Bling Libra and the Evolving Extortion Economy
unit42.paloaltonetworks.comยท2h
๐ŸŽซKerberos Attacks
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.ioยท2d
๐ŸŒWARC Forensics
ITDR vs EDR: What are the Key Differences?
heimdalsecurity.comยท1d
๐ŸŽฏThreat Hunting
The Why of PGP Authentication
articles.59.caยท10h
๐Ÿ”‘Cryptographic Protocols
How the Growth of AI May Drive a Fundamental Step-Change in the Domain Name Landscape
circleid.comยท1d
๐Ÿ“กDNS Archaeology
Dark Web Monitoring Against Invisible Cyber Threats
securityscorecard.comยท7h
๐ŸŽฏThreat Hunting
Investigating targeted โ€œpayroll pirateโ€ attacks affecting US universities
microsoft.comยท1d
๐ŸŽฏNTLM Attacks
From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses
arxiv.orgยท19h
โœจEffect Handlers
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
Anthropic finds 250 poisoned documents are enough to backdoor large language models
the-decoder.comยท8h
๐Ÿ”Vector Forensics
Announcing the 2025 NDSA Excellence Award Winners
ndsa.orgยท10h
๐Ÿ›๏ธPREMIS Metadata
Welcome to LILโ€™s Data.gov Archive Search
lil.law.harvard.eduยท3h
๐Ÿ’พData Preservation
LABScon25 Replay | Auto-Poking The Bear: Analytical Tradecraft In The AI Age
sentinelone.comยท1d
๐ŸŽฏThreat Hunting
Open Lineage
usenix.orgยท19h
๐Ÿ”ŒInterface Evolution
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท8hยท
Discuss: Hacker News
๐ŸŽซKerberos Exploitation