Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·1h
🔐Cryptographic Archaeology
Nix pills
nixos.org·1d
❄️Nixpkgs
How to Prevent NPM Supply Chain Attacks in CI/CD Pipelines with Container Security
blog.qualys.com·50m
📦Container Security
Are Software Registries Inherently Insecure?
developers.slashdot.org·12h
📦Container Security
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
rapid7.com·44m
🔓Hacking
Python is adding Zstandard to the standard library in 3.14
discuss.python.org·3h·
Discuss: Hacker News
📚Lempel-Ziv
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·5h
🎫Kerberos Exploitation
Security Affairs newsletter Round 544 by Pierluigi Paganini – INTERNATIONAL EDITION
securityaffairs.com·1d
🛡Cybersecurity
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·18h·
Discuss: Hacker News
🛡️WASM Security
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·9h
🔐Capability Systems
Countless security vulnerabilities in Dell PowerProtect Data Domain closed
heise.de·17h
🔓Hacking
Red Stone One Carat — TryHackMe Challenge Write-up
infosecwriteups.com·2d
🛡️CLI Security
ELA-1534-1 freeipa security update
freexian.com·1d
🎫Kerberos Exploitation
Scribd – A Goldmine of Sensitive Data
medium.com·1d·
Discuss: Hacker News
💣Compression Security
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·2d
🛡️RISC-V Security
Ouch! Microsoft admits Windows 11's OneDrive syncing could be slowing down your PC
techradar.com·50m
🔌Offline-first Apps
6th October – Threat Intelligence Report
research.checkpoint.com·4h
🛡Cybersecurity
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·13h
🔓Hacking
Rejected announces from libtorrent clients proxying through SOCKS
catgirl.online·12h·
Discuss: Hacker News
🏴‍☠️Piracy
Stalwart Labs
stalw.art·5h
Archive Fixity