Nextcloud PAM authentication
🎯NTLM Attacks
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.com·1d
🔓Hacking
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·1d
🌳Archive Merkle Trees
Flag this post
Guide: TLS and QUIC
🌐DNS over QUIC
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
🔍NTLM Forensics
Flag this post
When AI Accelerates Cloud Migrations, Don't Let Security Be an Afterthought
rapid7.com·17h
🔐Capability Systems
Flag this post
Testing Prompt Injection "Defenses": XML vs. Markdown, System vs. User Prompts
⚡Proof Automation
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
🔌Interface Evolution
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·21h
🛡️eBPF Security
Flag this post
Punching Holes into Firewalls
🌐DNS over QUIC
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.com·1d
🎯Threat Hunting
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.com·1d
🔐Quantum Security
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·13h
🔓Hacking
Flag this post
Stop Writing Code, Start Writing Docs
thenewstack.io·10h
⚙️TLA+
Flag this post
How to find DNN Software installations on your network
runzero.com·12h
🛡️Security Headers
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.com·1d
🛣️BGP Hijacking
Flag this post
Oops, My UUIDs Collided
🧪Binary Fuzzing
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
Loading...Loading more...