OpenTelemetry Collector: The Backbone of Modern Observability Pipelines
blog.devops.devΒ·17h
ποΈSystem Observability
Flag this post
The art and science of effective security storytelling
redcanary.comΒ·18h
πData Provenance
Flag this post
Windowsβ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nzΒ·20h
π―NTLM Attacks
Flag this post
Week 3 of my Home Lab, Active Directory Account Lockout Policy, Logging & Monitoring
π Homelab Pentesting
Flag this post
Windows Insider Previews Improve Search and Bring Memory Checks
heise.deΒ·16h
πOperating system internals
Flag this post
Memento Labs, the ghost of Hacking Team, has returned β or maybe it was never gone at all.
securityaffairs.comΒ·10h
πHacking
Flag this post
How Archaeology Is Reviving the Smell of History
scientificamerican.comΒ·20h
πDocumentation Archaeology
Flag this post
Leverage Unlearning to Sanitize LLMs
arxiv.orgΒ·1d
π»Local LLMs
Flag this post
The Reel Deal: Why Audiovisual Heritage Matters
dpconline.orgΒ·10h
πΊMedia Archaeology
Flag this post
Let's Help NetBSD Cross the Finish Line Before 2025 Ends
discoverbsd.comΒ·21h
πOperating system internals
Flag this post
Overhaul of my dotfiles
markjgsmith.comΒ·16h
π¦Format Metamorphosis
Flag this post
New software tool fast-tracks identification and response to microbial threats
phys.orgΒ·12h
π¦ Malware Analysis
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioΒ·3h
πPassword Cracking
Flag this post
Simple BBS in a Commodore Emulator
adamwhitney.netΒ·7h
πΎvintage computing
Flag this post
Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild
unit42.paloaltonetworks.comΒ·11h
π‘οΈeBPF Security
Flag this post
Evil scam targets LastPass users with fake death certificate claims
techradar.comΒ·12h
π―NTLM Attacks
Flag this post
From Perimeter to SOC: How Integrating Cisco Firewalls with Splunk Delivers End-to-End Threat Visibility and Compliance
blogs.cisco.comΒ·19h
π‘Network Monitoring
Flag this post
Which tech company launched the world's first bug bounty program?
techspot.comΒ·15h
πIndie Hacking
Flag this post
Loading...Loading more...