Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Feeds to Scour
SubscribedAll
Inside Shanya, a packer-as-a-service fueling modern attacks
news.sophos.com·3h
🏺ZIP Archaeology
Preview
Report Post
Anatomy of a Domain Risk Engine: Regex vs. LLMs
urlert.com·3h·
Discuss: Hacker News
🕵️Domain Enumeration
Preview
Report Post
Cybersecurity strategies to prioritize now​​
microsoft.com·2d
🛡Cybersecurity
Preview
Report Post
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
seclists.org·1d
🛡️Security Headers
Preview
Report Post
Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs
securityaffairs.com·14h
🎫Kerberos Exploitation
Preview
Report Post
Death to one-time text codes: Passkeys are the new hotness in MFA
theregister.com·21h
🔐Quantum Security
Preview
Report Post
My Next.js server was compromised 24 hours after CVE-2025-55182 disclosure
asleepace.com·5h·
Discuss: Hacker News
📦Container Security
Preview
Report Post
What is a Pedersen commitment?
johndcook.com·13h
🔐Quantum Security
Preview
Report Post
The built-in Windows security features you should be using
pentestpartners.com·2d
🔒Secure Boot
Preview
Report Post
Running a fully autonomous .onion service directly on your OpenWrt router – no VPS, no cloud, just your home hardware
youtu.be·1d·
Discuss: r/homelab
🔍eBPF
Preview
Report Post
CERN accelerates towards usable security with new password policy
blog.passwordresearch.com·1d·
🔐Quantum Security
Preview
Report Post
What is the best tool to copy secrets between name spaces?
reddit.com·14h·
Discuss: r/kubernetes
🔐Archive Encryption
Preview
Report Post
Malicious Go Packages Impersonate Google's UUID Library and Exfiltrate Data
socket.dev·1d·
Discuss: Hacker News
🧪Binary Fuzzing
Preview
Report Post
Bridging the gaps between protocol specifications and practice
blog.apnic.net·2d
🌐NetworkProtocols
Preview
Report Post
Cloudflare Outage: Rust Analysis
splinter.com.au·1d·
Discuss: Hacker News
🦀Embedded Rust
Preview
Report Post
How attackers use real IT tools to take over your computer
malwarebytes.com·3d
🎫Kerberos Exploitation
Preview
Report Post
This Week in Security: React, JSON Formatting, and the Return of Shai Hulud
hackaday.com·1d
🔓Hacking
Preview
Report Post
New Prompt Injection Attack Vectors Through MCP Sampling
unit42.paloaltonetworks.com·1d
gRPC
Preview
Report Post
My Problem with Hacklore (WiFi)
thecontractor.io·8h·
Discuss: Hacker News
🔓Hacking
Preview
Report Post
Cryptography for the Everyday Developer: Understanding RSA
sookocheff.com·1d
🔐Homomorphic Encryption
Preview
Report Post