Web PKI Ditches TLS Client Authentication
feistyduck.comยท1dยท
Discuss: Hacker News
๐Ÿ”Certificate Analysis
Flag this post
Registry Analysis
windowsir.blogspot.comยท9hยท
๐Ÿ”NTLM Archaeology
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท7h
๐Ÿ›ก๏ธeBPF Security
Flag this post
"Trusted Crypto Recovery Experts: My Road With Dexdert Net Pro Recovery "
dev.toยท8hยท
Discuss: DEV
๐ŸบKerberos Archaeology
Flag this post
Nearly 58 billion personal data points have been leaked online since 2004, new study reveals
techradar.comยท2h
๐Ÿ”“Hacking
Flag this post
Idor โ€” TryHackMe writeup
infosecwriteups.comยท14h
๐ŸŒDNS Security
Flag this post
Digital Forensics Round-Up, October 29 2025
forensicfocus.comยท2d
๐Ÿ”Audio Forensics
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท1d
๐Ÿ”“Hacking
Flag this post
Notes from RIPE 91
blog.apnic.netยท23h
๐ŸŒDNS over QUIC
Flag this post
Build reliable AI systems with Automated Reasoning on Amazon Bedrock โ€“ Part 1
aws.amazon.comยท58m
โšกProof Automation
Flag this post
Aembit Introduces Identity And Access Management For Agentic AI
hackernoon.comยท13h
๐Ÿ”“Hacking
Flag this post
The internet was made for privacy
doctorow.medium.comยท6h
๐ŸงฒMagnetic Philosophy
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Ÿ”Quantum Security
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท4h
๐Ÿ”“Hacking
Flag this post
Closing the gaps in identity security with device intelligence
fingerprint.comยท1d
๐ŸŽฏThreat Hunting
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgยท1dยท
Discuss: Hacker News
๐Ÿ”Cryptographic Archaeology
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comยท12h
๐Ÿ•ต๏ธVector Smuggling
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท1dยท
Discuss: Substack
๐ŸŒNetworkProtocols
Flag this post
Phake phishing: Phundamental or pholly?
news.sophos.comยท11h
๐ŸŽฏThreat Hunting
Flag this post