Tor Browser 15 brings vertical tabs and improved organization
techspot.com·10h
🧅Tor Networks
Flag this post
API Attack Awareness: Business Logic Abuse — Exploiting the Rules of the Game
lab.wallarm.com·18h
🌐BGP Security
Flag this post
5 ways to prevent password reset attacks
fingerprint.com·5h
🎯NTLM Attacks
Flag this post
Evaluating Endpoint Management: Why legacy solutions don’t address modern concerns
jamf.com·15h
🔐Capability Systems
Flag this post
The Internet Runs on Free and Open Source Software–and So Does the DNS
icann.org·11h·
🌐DNS over QUIC
Flag this post
Windows’ Built-in OpenSSH for Offensive Security
pulsesecurity.co.nz·2d
🎯NTLM Attacks
Flag this post
Caddy snippets for static sites
willnorris.com·10h
🔌Interface Evolution
Flag this post
National Cybersecurity Awareness Month: UPnP and you…PnP
runzero.com·17h
📡Network Archaeology
Flag this post
Some Notes from RIPE-91
potaroo.net·1d
🌐DNS over QUIC
Flag this post
A phishing with invisible characters in the subject line, (Tue, Oct 28th)
isc.sans.edu·1d
🔤Character Encoding
Flag this post
Keep Android Open
keepandroidopen.org·1d·
🔓Open Source Software
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·12h·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
A Brief History of the Cypherpunk Movement
seykhel.org·2h·
Discuss: Hacker News
🔐Cryptographic Archaeology
Flag this post
Type Club - Understanding typing through the lens of Fight Club
revelry.co·1d·
Discuss: r/programming
📜Binary Philology
Flag this post
One Outage Away: Building Phishing Resilience Through Layered Defense
cofense.com·1d
🎯Threat Hunting
Flag this post
From Power Users to Protective Stewards: How to Tune Security Training for Specialized Employees
darkreading.com·17h
🎯Threat Hunting
Flag this post
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
koi.ai·8h·
Discuss: Hacker News
📦Package Managers
Flag this post
How SSL Certificates Work in Web Applications—What I think?
dev.to·13h·
Discuss: DEV
🌐NetworkProtocols
Flag this post
5 Essential Steps to Strengthen Kubernetes Egress Security
tigera.io·1d
📦Container Security
Flag this post
Re: A few comments on ‘age’ (2019)
groups.google.com·2d·
Discuss: Lobsters
🔐Archive Encryption
Flag this post