Beginner’s guide to malware analysis and reverse engineering
intezer.com·3d
🔗Binary Similarity
How we trained an ML model to detect DLL hijacking
securelist.com·3h
🔗Binary Similarity
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.to·7h·
Discuss: DEV
📏Code Metrics
A Global Mining Dataset
tech.marksblogg.com·44m·
Discuss: Hacker News
📦METS Containers
Reading the ENISA Threat Landscape 2025 report
securityaffairs.com·4h
🎯Threat Hunting
LLM-Generated Samples for Android Malware Detection
arxiv.org·7h
💻Local LLMs
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·3h
🎫Kerberos Exploitation
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·3d
🔗Binary Similarity
6th October – Threat Intelligence Report
research.checkpoint.com·1h
🛡Cybersecurity
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·4d·
Discuss: Hacker News
🌐DNS Security
NEWS ROUNDUP – 6th October 2025
digitalforensicsmagazine.com·52m
🚨Incident Response
Malvertising Campaign Hides in Plain Sight on WordPress Websites
blog.sucuri.net·2d
📡Feed Security
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.com·2d
📟Terminal Forensics
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.org·7h
🔲Cellular Automata
Are Software Registries Inherently Insecure?
developers.slashdot.org·10h
📦Container Security
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·10h
🔓Hacking
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·2d
🏴‍☠️Piracy
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·7h
🔐Capability Systems
Adventures on the AI Coding side of things
medium.com·3h·
Discuss: Hacker News
🌍Cultural Algorithms
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·16h·
Discuss: Hacker News
🛡️WASM Security