HTB Vintage Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.comΒ·1d
🎯NTLM Attacks
You’re invited: Four phishing lures in campaigns dropping RMM tools
redcanary.comΒ·20h
🎫Kerberos Attacks
VMScape: Exploiting Incomplete Branch Predictor Isolation in Cloud Environments
comsec.ethz.chΒ·1dΒ·
πŸ›‘οΈRISC-V Security
Why the best LLMs are not enough for the AI SOC
intezer.comΒ·18h
🎯Threat Hunting
UTF-8 as told by Rob Pike
doc.cat-v.orgΒ·22mΒ·
Discuss: Hacker News
πŸ”€Character Encoding
Homelab Update!
i.redd.itΒ·12hΒ·
Discuss: r/homelab
🏠Homelab
August 2025 Detection Highlights: 9 New VTIs, 20+ YARA Rules, and More Advanced Malware Insights
vmray.comΒ·1d
🦠Malware Analysis
The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comΒ·2d
πŸ”Archive Cryptanalysis
NightMARE on 0xelm Street, a guided tour
elastic.coΒ·1d
πŸ§ͺBinary Fuzzing
Windows KASLR Bypass – CVE-2025-53136
crowdfense.comΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Active Directory Security Tip #1: Active Directory Admins
adsecurity.orgΒ·9h
πŸ”’LDAP Security
Trusted Connections, Hidden Risks: Token Management in the Third-Party Supply Chain
unit42.paloaltonetworks.comΒ·10h
πŸ”—Data Provenance
Show HN: VibeDbg – Cconversational, LLM-Powered AI Assistant for WinDbg
github.comΒ·10hΒ·
Discuss: Hacker News
πŸŽ™οΈWhisper
What’s New in the Latest Trisul Release
trisul.orgΒ·20h
🌊Streaming Systems
Building Production-Ready LLM Integrations With MCP Over gRPC - Mehrdad Afshari, Signeen Inc.
youtube.comΒ·8h
⚑gRPC
MetaRAG: Metamorphic Testing for Hallucination Detection in RAG Systems
arxiv.orgΒ·1d
πŸŒ€Brotli Internals
The Data Backbone of LLM Systems
infoq.comΒ·1dΒ·
Discuss: Lobsters
πŸ”—Constraint Handling
Yurei & The Ghost of Open Source Ransomware
research.checkpoint.comΒ·20h
🎫Kerberos Exploitation