Att&Df: Update the Operating System's "Dead Drop"
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.orgยท4h
๐Ÿ”“Hacking
SonicWall investigation shows hackers gained wide access to customer backup files
cybersecuritydive.comยท4h
๐Ÿ”“Hacking
FCKGW: How an internal Microsoft leak fueled Windows XP piracy
techspot.comยท1h
๐ŸบKerberos Archaeology
Alexander Fehrmann: How To Analyze Impression Evidence In Amped FIVE
forensicfocus.comยท1d
๐Ÿ”Binary Forensics
Investigating targeted โ€œpayroll pirateโ€ attacks affecting US universities
microsoft.comยท1d
๐ŸŽฏNTLM Attacks
Man-in-the-Middle Detection
infosecwriteups.comยท1d
๐ŸŽฏThreat Hunting
NEWS ROUNDUP โ€“ 10th October 2025
digitalforensicsmagazine.comยท8h
๐ŸšจIncident Response
BYOVD to the next level (part 2) โ€” rootkit like it's 2025
blog.quarkslab.comยท1d
๐Ÿ”eBPF
Comprehensive Guide to Vulnerability Management for Security Professionals
jamf.comยท1d
๐Ÿ”“Hacking
Building a VHF / LoRa APRS Bridge | F4FXL
f4fxl.orgยท8h
๐Ÿ“ปHomebrew Protocols
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
DFIR Next Steps: Suspicious Pulseway Use
cybertriage.comยท1d
๐Ÿ›ก๏ธeBPF Security
RondoDox Botnet targets 56 flaws across 30+ device types worldwide
securityaffairs.comยท11h
๐Ÿ Homelab Pentesting
Metasploit Wrap Up 10/09/2025
rapid7.comยท23h
๐Ÿ›ก๏ธeBPF Security
Phishing Protection: Tools SOC Teams Trust in 2025 โ€“ An Ultimate Guide
vmray.comยท2d
๐ŸŽฏThreat Hunting
VoIP Eavesdropping: How it Works, Threats & Defense Tactics
enablesecurity.comยท1d
๐ŸŒNetwork Security
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology