Feeds to Scour
SubscribedAll
Scoured 15529 posts in 134.7 ms
Windows Networks: Google Mandiant Delivers the Coup de Grâce to Microsoft's NTLM
heise.de·2d·
Discuss: Hacker News
🎯NTLM Attacks
Preview
Report Post
ArchAgent: Scalable Legacy Software Architecture Recovery with LLMs
arxiv.org·1d
🔗Archive Combinators
Preview
Report Post
Secure Boot, TPM and Anti-Cheat Engines
andrewmoore.ca·3h·
Discuss: Lobsters
🔒Hardware Attestation
Preview
Report Post
Digital Forensics Round-Up, January 21 2026
forensicfocus.com·17h
🔍Audio Forensics
Preview
Report Post
AI-Powered Penetration Testing: How I Used Claude + Kali Linux MCP to Automate Security Assessments
dev.to·1h·
Discuss: DEV
🏠Homelab Pentesting
Preview
Report Post
Show HN: Link Graph Analysis Tool for Osint Analysts with 70 Transforms
webvetted.com·21h·
Discuss: Hacker News
🌐WARC Forensics
Preview
Report Post
Fastfetch 2.58 System Information Tool Enhances Linux and macOS Detection
linuxiac.com·1d
🔍eBPF
Preview
Report Post
jgmdev/ddos-deflate: Fork of DDoS Deflate with fixes, improvements and new features.
github.com·8h
🛡️eBPF Security
Preview
Report Post
U.S. CISA adds a flaw in Cisco Unified Communications products to its Known Exploited Vulnerabilities catalog
securityaffairs.com·2h
💣ZIP Vulnerabilities
Preview
Report Post
Personal Knowledge Management
reseek.net·3h
🧠Personal Knowledge Base
Preview
Report Post
Recap of ELISA Project at Linux Plumbers Conference: Tokyo, Japan 2025
elisa.tech·15h
🔍eBPF
Preview
Report Post
Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint
microsoft.com·4h
🎯NTLM Attacks
Preview
Report Post
Holmes: An Evidence-Grounded LLM Agent for Auditable DDoS Investigation in Cloud Networks
arxiv.org·4h
👁️Observatory Systems
Preview
Report Post
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes
rapid7.com·19h
🔐HSM Integration
Preview
Report Post
Forward to the Past: The Y2K38 Problem Ahead
bitsight.com·13h
🌳Archive Merkle Trees
Preview
Report Post
Hackers exploit security testing apps to breach Fortune 500 firms
bleepingcomputer.com·19h
🕵️Penetration Testing
Preview
Report Post
[Podcast] NITK Students at IETF: Fresh minds for standards development
blog.apnic.net·13h
📝ABNF Parsing
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·21h
📊Static Analysis
Preview
Report Post
Software Heritage Archive recognized as a digital public good
softwareheritage.org·1d
🏺Format Archaeology
Preview
Report Post
There's a secret computer inside your computer
xda-developers.com·12h
🔒Secure Boot
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help