Kerberoasting
blog.cryptographyengineering.comยท2dยท
๐ŸŽซKerberos Exploitation
HTB Vintage Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comยท15h
๐Ÿ”NTLM Archaeology
Are cybercriminals hacking your systems โ€“ or just logging in?
welivesecurity.comยท1d
๐Ÿ”“Hacking
IT security: BSI gives tips on Microsoft Office โ€“ and warns of "residual risks"
heise.deยท2h
๐Ÿ”คEBCDIC Privacy
Youโ€™re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.comยท8h
๐ŸŽซKerberos Attacks
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.chยท16hยท
๐Ÿ›ก๏ธRISC-V Security
Tunneling
github.comยท7hยท
Discuss: Hacker News
๐ŸŒDNS over QUIC
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comยท1d
๐Ÿฆ Malware Analysis
This Week in Security: NPM, Kerbroasting, and The Rest of the Story
hackaday.comยท7h
๐Ÿ”“Hacking
Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand
theregister.comยท1d
๐ŸŽซKerberos Attacks
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.toยท2dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
This long-exposed SonicWall flaw is being used to infect organizations with Akira ransomware - so patch now
techradar.comยท1d
๐ŸŽซKerberos Exploitation
NightMARE on 0xelm Street, a guided tour
elastic.coยท21h
๐ŸงชBinary Fuzzing
Windows KASLR Bypass โ€“ CVE-2025-53136
crowdfense.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Lessons in Disabling RC4 in Active Directory
syfuhs.netยท1dยท
๐ŸŒŠStream Ciphers
Signed and Dangerous: BYOVD Attacks on Secure Boot
binarly.ioยท1d
๐Ÿ”’Secure Boot
Bypassing WAFs for Fun and JavaScript Injection with Parameter Pollution
blog.ethiack.comยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธWASM Sandboxing
Plex users: Reset your password!
malwarebytes.comยท2d
๐Ÿ”“Password Cracking
Pass The Hash - How Hackers Get Access Without Passwords
infosecwriteups.comยท5d
๐Ÿ”NTLM Forensics