Feeds to Scour
SubscribedAll
Digital Forensics Round-Up, December 10 2025
forensicfocus.comยท22h
๐Ÿ”Audio Forensics
Preview
Report Post
Discover the Best Incident Response Tools: A Comprehensive Guide for 2026
vmray.comยท18h
๐ŸšจIncident Response
Preview
Report Post
Hunting for Mythic in network traffic
securelist.comยท2h
๐ŸŒณArchive Merkle Trees
Preview
Report Post
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning
arxiv.orgยท9h
โš”๏ธLean Tactics
Preview
Report Post
Detectify year in review 2025
blog.detectify.comยท2h
๐ŸŽฏThreat Hunting
Preview
Report Post
Beyond the bomb: When adversaries bring their own virtual machine for persistence
redcanary.comยท1d
๐ŸŽซKerberos Exploitation
Preview
Report Post
UP Squared Pro TWL AI Dev Kit Review โ€“ Intel N150 + Hailo-8L accelerator tested on Ubuntu 24.04
cnx-software.comยท18m
๐Ÿ”ŒOperating system internals
Preview
Report Post
Outbound HTB Walkthrough / Solution โ€” Exploiting Roundcube Webmail CVE-2025โ€“49113 and Rooting viaโ€ฆ
infosecwriteups.comยท1d
๐ŸŽฏNTLM Attacks
Preview
Report Post
Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
unit42.paloaltonetworks.comยท3h
๐ŸŽซKerberos Exploitation
Preview
Report Post
Bringing USDT Power to Parca
polarsignals.comยท21hยท
Discuss: Hacker News
๐Ÿ›ก๏ธeBPF Security
Preview
Report Post
NANOREMOTE, cousin of FINALDRAFT
elastic.coยท23h
๐Ÿ“ฆContainer Security
Preview
Report Post
NEWS ROUNDUP โ€“ 10th December 2025
digitalforensicsmagazine.comยท1d
๐ŸšจIncident Response
Preview
Report Post
API Load Testing: A Comprehensive Guide to Concepts, Metrics, and Test Types
blog.devops.devยท1d
๐Ÿ‘๏ธSystem Observability
Preview
Report Post
Operation WrtHug Exposed: The Router Hack You Need to Know
securityscorecard.comยท19h
๐Ÿ›ฃ๏ธBGP Hijacking
Preview
Report Post
HTTPS certificate industry phasing out less secure domain validation methods
security.googleblog.comยท18hยท
๐ŸŒDNS Security
Preview
Report Post
Releasing Open Source Tools to the Community
windowsir.blogspot.comยท16hยท
๐Ÿ”“Open Source Software
Preview
Report Post
SEO poisoning with legit AI chats delivers AMOS stealer
huntress.comยท10hยท
Discuss: Hacker News
๐Ÿ“ŸTerminal Forensics
Preview
Report Post
Storm-0249 Abuses EDR Processes in Stealthy Attacks
darkreading.comยท16h
๐ŸŽซKerberos Exploitation
Preview
Report Post
Writing an Outlook Add-in in Rust
tritium.legalยท22hยท
Discuss: Hacker News
๐ŸšNordic Shell
Preview
Report Post
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
research.checkpoint.comยท23h
๐ŸบZIP Archaeology
Preview
Report Post