Windows Authentication, Pass-the-Hash, Credential Dumping, Domain Security

Demonstrating a Rollback Attack on a Honda via HackRF Portapack and an Aftermarket Security Solution
rtl-sdr.com·22h
📻Homebrew Protocols
Flag this post
ImapGoose status update: v0.3.2
whynothugo.nl·9h
🔄Sync Engine
Flag this post
Vulnerability Analysis: Deconstructing the $147k Sharwa Finance Exploit
blog.verichains.io·1d
🎫Kerberos Attacks
Flag this post
Agent Fatigue Is Real and Your Security Stack Is to Blame
heimdalsecurity.com·3d
🎯Threat Hunting
Flag this post
Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days
news.risky.biz·2d
🔓Hacking
Flag this post
Re: A few comments on ‘age’ (2019)
groups.google.com·4d·
Discuss: Lobsters
🔐Archive Encryption
Flag this post
My first fifteen compilers (2019)
blog.sigplan.org·2h·
Discuss: Hacker News
🏗️Compiler Archaeology
Flag this post
Millions Impacted by Conduent Data Breach
securityweek.com·1d·
Discuss: Hacker News
🎫Kerberos Attacks
Flag this post
A Few Comments on 'Age'
neilmadden.blog·3d·
Discuss: Hacker News
🔐Archive Encryption
Flag this post
Runs-On: Mac
runs-on-mac.com·5h·
Discuss: Hacker News
🖥️Modern Terminals
Flag this post
Agentic AI and Security
martinfowler.com·3d·
💻Local LLMs
Flag this post
Everyone Wants to Hack — No One Wants to Think
infosecwriteups.com·15h
🔓Hacking
Flag this post
Age Verification, Estimation, Assurance, Oh My! A Guide to the Terminology
eff.org·1d
🛡Cybersecurity
Flag this post
#4 RFI: From an External URL Into your Application
infosecwriteups.com·16h
📡Feed Security
Flag this post
Phishing scam uses fake death notices to trick LastPass users
malwarebytes.com·4d
🔓Password Cracking
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Medical Imaging
dev.to·3d·
Discuss: DEV
🔲Lattice Cryptography
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
csoonline.com·4h·
Discuss: Hacker News
📦Package Managers
Flag this post
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
dev.to·3d·
Discuss: DEV
🛡Cybersecurity
Flag this post
Show HN: Front End Fuzzy and Substring and Prefix Search
github.com·2d·
Discuss: Hacker News
🌳Trie Structures
Flag this post
Turning 500 Lines of If-Else Into a Config Switch: Strategy Pattern in Go
dev.to·5h·
Discuss: DEV
⚔️Lean Tactics
Flag this post