Show HN: AI Agent for Microsoft Grap Red Team Framework
github.com·2d·
Discuss: Hacker News
🏠Homelab Pentesting
Flag this post
Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·19h
🛡Cybersecurity
Flag this post
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated
dev.to·7h·
Discuss: DEV
🧪Protocol Fuzzing
Flag this post
Research Worth Reading Week 43/2025
pentesterlab.com·1h
🛡️Proof-Carrying Archives
Flag this post
Why Threat Actors Succeed
paloaltonetworks.com·2d
🎯Threat Hunting
Flag this post
New API testing category now available
blog.detectify.com·3d
🧪Protocol Fuzzing
Flag this post
Checking Network Vulnerability
reddit.com·22h·
Discuss: r/homelab
🏠Homelab Pentesting
Flag this post
Shifting from reactive to proactive: Cyber resilience amid nation-state espionage
cyberscoop.com·2d
🎯Threat Hunting
Flag this post
Collins Aerospace: Old Passwords and Delayed Response Enable Data Theft
heise.de·4h
🔓Hacking
Flag this post
OSCP vs. OSWE: Which Certification Fits Your Career Goals?
offsec.com·4d
🔓Hacking
Flag this post
Are Network Security Devices Endangering Orgs With 1990s-Era Flaws?
it.slashdot.org·19h
🔓Hacking
Flag this post
Researchers warn of critical flaws in TP-Link routers
cybersecuritydive.com·2d
🔓Hacking
Flag this post
[REVIVE-SA-2025-002] Revive Adserver Vulnerability
seclists.org·19h
🎫Kerberos Exploitation
Flag this post
Hardening your home lab
pentestpartners.com·3d
📦Container Security
Flag this post
Microsoft Issues Emergency Patch for Critical Windows Server Bug
darkreading.com·2d
🎫Kerberos Exploitation
Flag this post
Inside the AI Red Teaming CTF: What 200+ Players Taught Us About Breaking and Defending LLMs
hackerone.com·3d
🏠Homelab Pentesting
Flag this post
Shield AI unveils AI piloted VTOL stealth drone
ukdefencejournal.org.uk·16h·
Discuss: Hacker News
🕵️Vector Smuggling
Flag this post
An (unbreakable?) way to do tunneling (part-1)
freedomhascost.bearblog.dev·44m·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
AI and Human Error Create a “Perfect Storm” for Mobile Security
zimperium.com·2d
🛡️CLI Security
Flag this post
The Emergence of Cognitive Intelligence (COGINT) as a New Military Intelligence Collection Discipline
tandfonline.com·1d
🧠Intelligence Compression
Flag this post