An (unbreakable?) way to do tunneling (part-1)
freedomhascost.bearblog.dev·4h·
Discuss: Hacker News
🛣️BGP Hijacking
Flag this post
Beyond good ol’ Run key, Part 153
hexacorn.com·2d
🔍NTLM Forensics
Flag this post
AI and Human Error Create a “Perfect Storm” for Mobile Security
zimperium.com·2d
🛡️CLI Security
Flag this post
The Emergence of Cognitive Intelligence (COGINT) as a New Military Intelligence Collection Discipline
tandfonline.com·1d
🧠Intelligence Compression
Flag this post
Priority Scanning: Get Faster Visibility into Exposures Across your Attack Surface
bitsight.com·3d
💿Optical Forensics
Flag this post
Arch Linux AUR Hit by Another DDoS Attack, Port 22 Access Disrupted
linuxiac.com·8h
🔍eBPF
Flag this post
Embedding Leak Auditor
medium.com·4h·
Discuss: Hacker News
🕵️Vector Smuggling
Flag this post
BeyondTrust PAM – Secure SSH Access and File Transfers with Password Safe
apple.lib.utah.edu·2d
🔐Archive Encryption
Flag this post
How bugs made me believe in TDD
patrickm.de·12h·
Discuss: Hacker News
🔍Concolic Testing
Flag this post
How to reduce costs with self-service password resets
bleepingcomputer.com·2d·
Discuss: Hacker News
🔒Secure Boot
Flag this post
TOLLBOOTH: What's yours, IIS mine
elastic.co·5d
🛡️eBPF Security
Flag this post
Welcome to the Distributed Computing Forum ... say Hello
forums.anandtech.com·13h
🔀CRDT
Flag this post
Business Logic Testing: Protect Mobile Apps from Exploits and Fraud
nowsecure.com·4d
🧪Binary Fuzzing
Flag this post
Weekly Update 475
troyhunt.com·1d
🏺Kerberos Archaeology
Flag this post
Amazon Explains How Its AWS Outage Took Down the Web
wired.com·1d
👁️Observatory Systems
Flag this post
Show HN: Zimic: TypeScript-first HTTP integrations
zimic.dev·6h·
Discuss: Hacker News
🔌Interface Evolution
Flag this post
How to Make it in a Security Team
cryptologie.net·11h
🔓Hacking
Flag this post
Rapid7 at Pwn2Own: Raising the Bar in Vuln Intel
rapid7.com·2d
🔓Hacking
Flag this post
Automated Incident Response: What It Is and Why You Can’t Afford to Ignore It
vmray.com·4d
🚨Incident Response
Flag this post
Why Live Geo Dashboards Need Audits
aivojournal.org·14h·
Discuss: Hacker News
🔗Data Provenance
Flag this post