HTB Sherlocks: Meerkat Walkthrough
infosecwriteups.comΒ·15h
🎫Kerberos Exploitation
How weak passwords and other failings led to catastrophic breach of Ascension
arstechnica.comΒ·9hΒ·
🏺Kerberos Archaeology
GWSC Three Factor Authentication RFC (Draft-GWC-27001-3A)
gwsc-3fa.orgΒ·6hΒ·
Discuss: Hacker News
πŸ”Capability Systems
Digital Forensics Round-Up, September 17 2025
forensicfocus.comΒ·1d
πŸ”Audio Forensics
DFIR Next Steps: Suspicious AnyDesk Use
cybertriage.comΒ·9h
πŸ”ŒOperating system internals
Automated Semantic Drift Detection and Mitigation in Real-Time Multimodal Data Streams
dev.toΒ·5hΒ·
Discuss: DEV
🌊Stream Processing
Product comparison: Detectify vs. Nessus
blog.detectify.comΒ·15h
🎫Kerberos History
How to join the desync endgame: Practical tips from pentester Tom Stacey
portswigger.netΒ·7h
πŸ›£οΈBGP Hijacking
Mastering Digital Breadcrumbs to Stay Ahead of Evolving Threats
darkreading.comΒ·1d
🚨Incident Response
Meditations on Metadata Remediation: Lessons Learned From Digital Collection Internships
blogs.lib.umich.eduΒ·4h
🏺Media Archaeology
Logical imaging in Insight Forensic 5.7
blog.atola.comΒ·14h
πŸ’ΏOptical Forensics
I'm already in too deep (Windows based media server questions)
amazon.comΒ·1dΒ·
Discuss: r/homelab
πŸ”ŒOperating system internals
NTFS $UsnJrnl Journal Artifacts- Uncover Ransomware Activity
infosecwriteups.comΒ·16h
πŸ”NTLM Archaeology
Forensic Technology Day 2025
blog.passware.comΒ·1d
πŸ’ΏDAT Forensics
Wrangling Windows Event Logs with Hayabusa & SOF-ELK (Part 1)
blackhillsinfosec.comΒ·1d
🏺Kerberos Archaeology
Crims bust through SonicWall to grab sensitive config data
theregister.comΒ·7h
πŸ”“Hacking
Rippling IT IAM solution review
techradar.comΒ·9h
🌊Stream Processing
LIGHT-HIDS: A Lightweight and Effective Machine Learning-Based Framework for Robust Host Intrusion Detection
arxiv.orgΒ·19h
🏠Home Automation
Microsoft Defender delivered 242% return on investment over three years​​
microsoft.comΒ·6h
🎫Kerberos History
InfoSec News Nuggets 9/18/2025
aboutdfir.comΒ·9h
πŸ”“Hacking