Understanding HSTS: The Backbone of Modern Web Security
hackernoon.com·20h
🛣️BGP Hijacking
Discord discloses third-party breach affecting customer support data
securityaffairs.com·3h
🛡Cybersecurity
Eliminating Boilerplate in PHP API Documentation
ltscommerce.dev·7h·
Discuss: Hacker News
🌐Web Standards
Programme
dcc.ac.uk·13h
🏷️Metadata Standards
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·8h
🎫Kerberos Attacks
Quick and Dirty Analysis of Possible Oracle E-Business Suite Exploit Script (CVE-2025-61882), (Mon, Oct 6th)
isc.sans.edu·20h
🎫Kerberos Exploitation
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·7h
🛡️eBPF Security
Announcing Google’s New AI Vulnerability Reward Program!
bughunters.google.com·1d
🌀Brotli Internals
SSH keys in TPM
blog.dan.drown.org·19h
🔒Hardware Attestation
Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·11h
🔐Cryptographic Archaeology
OpenSSH 10.1 Released
openssh.com·5h·
Discuss: Hacker News
🔐HSM Integration
Chat Smarter, Not Harder: Building an AI Chat Interface in Your Angular App
dev.to·2h·
Discuss: DEV
🔌Interface Evolution
Multi-Platform Video Uploads: Using Identity Provider Links
fusionauth.io·7h·
Discuss: Hacker News
🎬WebCodecs
6th October – Threat Intelligence Report
research.checkpoint.com·14h
🛡Cybersecurity
Stay Safe Online: Small Steps, Big Protection
cyberthreatalliance.org·13h
🛡Cybersecurity
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·20h
🔐Capability Systems
Purism Defends the Fourth Amendment in the Digital Age
puri.sm·5h
🧲Magnetic Philosophy
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·16h
🎫Kerberos Exploitation
Declarative Partial Updates Proposal
github.com·5h·
Discuss: Hacker News
🎬WebCodecs
RediShell: Critical Remote Code Execution
wiz.io·1h·
Discuss: Hacker News
📦Container Security