Network Captures, Traffic Mining, Connection Tracking, Protocol Dissection

Measuring characteristics of TCP connections at Internet scale
blog.cloudflare.com·2d·
Discuss: Hacker News
📡Network Archaeology
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·11h
🛡️eBPF Security
Flag this post
Low-Altitude UAV-Carried Movable Antenna for Joint Wireless Power Transfer and Covert Communications
arxiv.org·22h
🕵️Vector Smuggling
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.com·1d
🌐BGP Security
Flag this post
Technology Short Take 189
blog.scottlowe.org·13h
🏠Homelab Archaeology
Flag this post
Notes from RIPE 91
blog.apnic.net·1d
🌐DNS over QUIC
Flag this post
A User-Focused Approach To Core Web Vitals via OpenTelemetry
thenewstack.io·7h
👁️System Observability
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.net·8h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.com·1d·
Discuss: Hacker News
📡DNS Archaeology
Flag this post
Adaptive Fault Diagnostic System for BACnet HVAC Networks via Hyperdimensional Vector Analysis
dev.to·15h·
Discuss: DEV
👁️Observatory Systems
Flag this post
Proton's new observatory reveals over 100 billion records breached - here's what you need to know
techradar.com·8h
🔐Archive Cryptanalysis
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.net·1d
🌐DNS Security
Flag this post
NEWS ROUNDUP – 31st October 2025
digitalforensicsmagazine.com·16h
🛡Cybersecurity
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·6h
🔓Hacking
Flag this post
Limiting Large Network Outages
circleid.com·10h
🕸️Mesh Networks
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·16h
🕵️Vector Smuggling
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.tech·14h·
Discuss: Hacker News
🔍NTLM Forensics
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·17h
🛡️eBPF Security
Flag this post
Taking steps to end abusive traffic from cloud providers
anubis.techaro.lol·8h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
The internet was made for privacy
doctorow.medium.com·10h
🧲Magnetic Philosophy
Flag this post