Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comΒ·7h
πŸ›‘οΈeBPF Security
Flag this post
Notes from RIPE 91
blog.apnic.netΒ·23h
🌐DNS over QUIC
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netΒ·3hΒ·
Discuss: Hacker News
πŸ›£οΈBGP Hijacking
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comΒ·1d
🌐BGP Security
Flag this post
Implementing MQTT 5 in Go: A Deep Dive into Client Design - Part I
dev.toΒ·4hΒ·
Discuss: DEV
πŸ“‹Format Specification
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.comΒ·12h
πŸ•΅οΈVector Smuggling
Flag this post
NEWS ROUNDUP – 31st October 2025
digitalforensicsmagazine.comΒ·11h
πŸ›‘Cybersecurity
Flag this post
Registry Analysis
windowsir.blogspot.comΒ·8hΒ·
πŸ”NTLM Archaeology
Flag this post
The 10 best VPN detection tools for fraud prevention in 2025
fingerprint.comΒ·1d
πŸ•΅οΈNetwork Forensics
Flag this post
Spelunking Into SVG Phishing: Amatera Stealer and PureMiner DNS Deep Dive
circleid.comΒ·1d
πŸ›£οΈBGP Hijacking
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.orgΒ·1dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.comΒ·2d
🦠Malware Analysis
Flag this post
Generalized Consensus: Discovery and Propagation
multigres.comΒ·22hΒ·
Discuss: Hacker News
🀝Consensus Networks
Flag this post
The internet was made for privacy
doctorow.medium.comΒ·5h
🧲Magnetic Philosophy
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techΒ·9hΒ·
Discuss: Hacker News
πŸ”NTLM Forensics
Flag this post
BGP – The Guy Who Knows Every Shortcut on the Internet
blog.aarjun.techΒ·19hΒ·
Discuss: DEV, Hacker News
πŸ“‘BGP Archaeology
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comΒ·1d
🌳Archive Merkle Trees
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.netΒ·20h
🌐DNS Security
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers
bastille.netΒ·3d
πŸ•ΈοΈMesh Networking
Flag this post
Measuring characteristics of TCP connections at Internet scale
blog.cloudflare.comΒ·2dΒ·
Discuss: Hacker News
πŸ“‘Network Archaeology
Flag this post