Evading the Watchful Eye: A Red Teamer’s Guide to EDR Bypass Techniques
medium.com·11h
🔐Cryptographic Archaeology
WASM in the Kernel: Tales of Triumph and Trouble
riptides.io·9h·
Discuss: Hacker News
🔒WASM Capabilities
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
microsoft.com·6h
🎫Kerberos Exploitation
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·15h
🎫Kerberos Exploitation
Practical ZFS Performance Tuning: ARC, L2ARC, and SLOG Explained
discoverbsd.com·1d
🔍eBPF
They're in…now what? How to stop lateral movement when the phish bites
runzero.com·7h
🎫Kerberos Attacks
AgentSight: Keeping Your AI Agents Under Control with eBPF-Powered System Observability
dev.to·46m·
Discuss: DEV
🔍eBPF
Security Model: Wayland vs. Xorg in Linux
openlib.io·2h·
Discuss: Hacker News
🛡️RISC-V Security
My First Contribution to Linux
vkoskiv.com·11h·
📺VT100 Emulation
The eBPF Verifier – How Linux Safely Runs User Code in Kernel Space
qpoint.io·6d·
Discuss: Hacker News
🔍eBPF
ELA-1534-1 freeipa security update
freexian.com·1d
🎫Kerberos Exploitation
NEWS ROUNDUP – 6th October 2025
digitalforensicsmagazine.com·12h
🚨Incident Response
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·19h
🔐Capability Systems
rblhost: Exploring Rust’s Role in Embedded Development Tools
mcuoneclipse.com·1d
🦀Embedded Rust
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
tenable.com·21h
🔓Hacking
This Week in Security: CVSS 0, Chwoot, and Not in the Threat Model
hackaday.com·3d
🛡️RISC-V Security
When your “home server” draws more power than your neighbor’s sauna
i.redd.it·1d·
Discuss: r/homelab
🏠HomeLab
Nix pills
nixos.org·1d
❄️Nixpkgs
FIPS certified vs. FIPS compliant: What’s the real difference?
yubico.com·8h
🔐Certificate Analysis