Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Registry Analysis
windowsir.blogspot.comยท8hยท
๐Ÿ”NTLM Archaeology
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท10hยท
Discuss: Hacker News
๐ŸŒWARC Forensics
Flag this post
Relevant โ€” TryHackMe Room Walkthrough
infosecwriteups.comยท1d
๐ŸŽฏNTLM Attacks
Flag this post
Linux Troubleshooting: These 4 Steps Will Fix 99% of Errors
linuxblog.ioยท8h
๐Ÿ“ŸTerminal Forensics
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
"Trusted Crypto Recovery Experts: My Road With Dexdert Net Pro Recovery "
dev.toยท8hยท
Discuss: DEV
๐ŸบKerberos Archaeology
Flag this post
Opinions & advice on my homelab network setup
reddit.comยท1hยท
Discuss: r/homelab
๐Ÿ–ฅHome Lab Setup
Flag this post
GMDSOFT Tech Letter Vol 15. Analyzing Anti-Forensic Traces Left By Location Spoofing Apps
forensicfocus.comยท10h
๐Ÿง Memory Forensics
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
Build reliable AI systems with Automated Reasoning on Amazon Bedrock โ€“ Part 1
aws.amazon.comยท53m
โšกProof Automation
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท22h
๐Ÿ”“Decompilation
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.comยท1d
๐ŸŽฏThreat Hunting
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comยท2d
๐Ÿฆ Malware Analysis
Flag this post
Oops, My UUIDs Collided
alexsci.comยท3hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
What to do when you have a crash in the runtime control flow guard check
devblogs.microsoft.comยท2d
๐ŸงชRISC-V Fuzzing
Flag this post
NEWS ROUNDUP โ€“ 29th October 2025
digitalforensicsmagazine.comยท2d
๐ŸšจIncident Response
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netยท20h
๐ŸŒDNS Security
Flag this post