Active Directory Security Tip #1: Active Directory Admins
adsecurity.orgยท5h
๐ŸขActive Directory
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
Are cybercriminals hacking your systems โ€“ or just logging in?
welivesecurity.comยท1d
๐Ÿ”“Hacking
HTB Vintage Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comยท22h
๐Ÿ”NTLM Archaeology
9 Best Practices for API Security โš”๏ธ
newsletter.systemdesign.oneยท20h
โšกgRPC
The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comยท2d
๐Ÿ”Archive Cryptanalysis
What is Data Exfiltration and How to Prevent It
securityscorecard.comยท8h
๐Ÿ•ณ๏ธInformation Leakage
Lessons in Disabling RC4 in Active Directory
syfuhs.netยท1dยท
๐ŸŒŠStream Ciphers
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.comยท6h
๐Ÿ”—Data Provenance
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comยท15h
๐Ÿ”“Hacking
Youโ€™re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.comยท16h
๐ŸŽซKerberos Attacks
Researchers warn VoidProxy phishing platform can bypass MFA
cybersecuritydive.comยท13h
๐ŸŽซKerberos Attacks
Rating 26 years of Java changes
neilmadden.blogยท7h
๐Ÿ—๏ธCompiler Archaeology
Microsoft Store and WinGet: Security Risks for Corporate Environments
blackhillsinfosec.comยท2d
๐Ÿ”“LDAP Injection
Why the best LLMs are not enough for the AI SOC
intezer.comยท14h
๐ŸŽฏThreat Hunting
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations
arxiv.orgยท2d
๐Ÿ”’Language-based security
Cyber Essentials Explained โ€“ And How Heimdal Helps You Pass and Stay Compliant
heimdalsecurity.comยท16h
๐Ÿ”’Secure Boot
Keeping Data Safe with OpenZFS: Security, Encryption, and Delegation
klarasystems.comยท2d
๐Ÿ’ฟZFS Internals
Why Python is Revolutionizing Cybersecurity: The Psychology-Driven Approach That's Changing Everything
dev.toยท10hยท
Discuss: DEV
๐ŸŽฏThreat Hunting