eBPF Rootkit
🛡️eBPF Security
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🎯NTLM Attacks
Flag this post
Second-order prompt injection can turn AI into a malicious insider
techradar.com·1d
🎫Kerberos Attacks
Flag this post
U.S. CISA adds an Oracle Fusion Middleware flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·20h
🔓Hacking
Flag this post
Building a Windows-based homelab to prep for IT roles. What should I add next to be more employable?
🏠Homelab Pentesting
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
CVE-2025-13315, CVE-2025-13316: Critical Twonky Server Authentication Bypass (NOT FIXED)
rapid7.com·3d
🎯NTLM Attacks
Flag this post
A $5 Domain Purchase Exposed Critical AI Agent Security Flaws – Deep Dive
🎫Kerberos Exploitation
Flag this post
PlushDaemon compromises network devices for adversary-in-the-middle attacks
welivesecurity.com·3d
🛣️BGP Hijacking
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·17h
🎫Kerberos Attacks
Flag this post
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
tenable.com·1d
🔤EBCDIC Privacy
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
🎫Kerberos History
Flag this post
Legacy web forms are the weakest link in government data security
cyberscoop.com·1d
📜Family History Data
Flag this post
Loading...Loading more...