HTTP desync attacks: request smuggling reborn
portswigger.netยท3hยท
Discuss: Hacker News
๐Ÿ›ฃ๏ธBGP Hijacking
Flag this post
How to find DNN Software installations on your network
runzero.comยท5h
๐Ÿ”“Hacking
Flag this post
Aembit Introduces Identity And Access Management For Agentic AI
hackernoon.comยท13h
๐Ÿ”“Hacking
Flag this post
HTTPS by default
security.googleblog.comยท3dยท
๐ŸŒWeb Standards
Flag this post
Free Wi-Fi Deal Raises Mobile Network Security Warnings for Travelers
zimperium.comยท1d
๐Ÿ“กFeed Security
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.comยท2h
๐Ÿ”“Hacking
Flag this post
French minister vows Louvre anti-intrusion devices after post-heist report finds security lapses
the-independent.comยท7h
๐Ÿท๏ธMemory Tagging
Flag this post
Idor โ€” TryHackMe writeup
infosecwriteups.comยท14h
๐ŸŒDNS Security
Flag this post
Show HN: Font Finder โ€“ Find and Copy Fonts from Any Webpage
font-finder.orgยท21hยท
Discuss: Hacker News
๐Ÿ”คFont Archaeology
Flag this post
Question about 'root' and security from someone just starting
reddit.comยท22hยท
Discuss: r/homelab
๐Ÿ“ฆContainer Security
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.toยท1dยท
Discuss: DEV
๐ŸงชBinary Fuzzing
Flag this post
What's the point of HTTP Signatures? (All open source)
orangestack.substack.comยท1dยท
Discuss: Substack
๐ŸŒNetworkProtocols
Flag this post
BYOD security solutions explained
proton.meยท10h
๐Ÿ”Capability Security
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
Security awareness: four pillars for staying safe online
pentestpartners.comยท1d
๐Ÿ”“Hacking
Flag this post
NEWS ROUNDUP โ€“ 31st October 2025
digitalforensicsmagazine.comยท12h
๐Ÿ›กCybersecurity
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท10hยท
Discuss: Hacker News
๐Ÿ”NTLM Forensics
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท1d
๐ŸŒณArchive Merkle Trees
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐ŸŒBGP Security
Flag this post