Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

eBPF Rootkit
synacktiv.com·13h·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
OSI Layer 4 Security Vulnerabilities & Resolutions
dev.to·16h·
Discuss: DEV
📡Network Monitoring
Flag this post
ToddyCat: your hidden email assistant. Part 1
securelist.com·1d
🔓Hacking
Flag this post
Windows ARM64 Internals: Deconstructing Pointer Authentication
preludesecurity.com·8h·
👑RISC-V Privilege
Flag this post
exploits.club Weekly(ish) Newsletter 92 - S23 N-Day PoCs, Printer Overflows, DNG OOB Writes, And More
blog.exploits.club·1d
💣ZIP Vulnerabilities
Flag this post
Microsoft Access .accdb encryption and simple Python implementation
yingtongli.me·2d
🔐Archive Encryption
Flag this post
Practical steps to minimize key exposure using AWS Security Services
aws.amazon.com·1d
🏠Homelab Security
Flag this post
It’s Not Always DNS: Exploring How Name Resolution Works
cefboud.com·1d·
Discuss: r/programming
🌐DNS Security
Flag this post
A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
techradar.com·3d
📟Terminal Forensics
Flag this post
Metasploit Wrap-Up 11/21/2025
rapid7.com·1d
🛡️CLI Security
Flag this post
This Week in Security: Cloudflare Wasn’t DNS, BADAUDIO, and Not a Vuln
hackaday.com·1d
🔓Hacking
Flag this post
TokenHolder Hack Analysis
blog.verichains.io·17h
🎫Kerberos Attacks
Flag this post
CVE-2025-50165: Critical Flaw in Windows Graphics Component
zscaler.com·12h·
Discuss: Hacker News
💣ZIP Vulnerabilities
Flag this post
Attackers are using “Sneaky 2FA” to create fake sign-in windows that look real
malwarebytes.com·3d
🔓Hacking
Flag this post
7-Zip: Attackers Inject Malicious Code
heise.de·2d
💣ZIP Vulnerabilities
Flag this post
Building a Windows-based homelab to prep for IT roles. What should I add next to be more employable?
reddit.com·1d·
Discuss: r/homelab
🏠Homelab Pentesting
Flag this post
LINE Messaging Bugs Open Asian Users to Cyber Espionage
darkreading.com·1d
🔤EBCDIC Privacy
Flag this post
The Original OTP: Inside the Only Encryption Proven to Be Unbreakable
hackernoon.com·1d
🔐Cryptographic Archaeology
Flag this post
Stop handling auth like it's 2007: My journey from hard-coded tokens to OAuth2 & JWKS with Go
reddit.com·1d·
Discuss: r/golang
🎫Kerberos History
Flag this post