Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐ŸŽฏThreat Hunting
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.comยท11h
๐Ÿ”ŒOperating system internals
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.ioยท3dยท
Discuss: Hacker News
๐Ÿ”eBPF
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.comยท1d
๐Ÿ“ฆContainer Security
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.clubยท3h
๐Ÿ”“Hacking
Flag this post
Statistically Adaptive Differential Protection for AC Microgrids Based on Kullback-Leibler Divergence
arxiv.orgยท16h
๐ŸŒŠDigital Signal Processing
Flag this post
Relevant โ€” TryHackMe Room Walkthrough
infosecwriteups.comยท1d
๐ŸŽฏNTLM Attacks
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท1h
๐Ÿ”“Hacking
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.comยท1d
๐Ÿฆ Malware Analysis
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Ÿ”“Decompilation
Flag this post
A User-Focused Approach To Core Web Vitals via OpenTelemetry
thenewstack.ioยท1h
๐Ÿ‘๏ธSystem Observability
Flag this post
The researcherโ€™s desk: CVE-2025-20362
blog.detectify.comยท7h
๐Ÿ”“Hacking
Flag this post
How to Build Your First MCP Server using FastMCP
hackernoon.comยท13h
โš™๏ธWASM Runtime
Flag this post
aperf: A CLI tool to gather performance data and visualize using HTML graphs
github.comยท13hยท
Discuss: Hacker News
๐Ÿ”eBPF
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.comยท1d
๐ŸŒDNS Security
Flag this post
Void Linux Gets Runkit, a Friendly GUI for Managing runit Services
linuxiac.comยท1h
๐Ÿ› System administration
Flag this post
OpenSMTPD 7.8.0p0
bsdsec.netยท9h
๐ŸกOpenBSD
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐Ÿฆ Parasitic Storage
Flag this post
Beyond DDoS Flooding: Understanding the Application Layer Attack Landscape
corero.comยท1d
๐ŸŒBGP Security
Flag this post
LotL Attack Hides Malware in Windows Native AI Stack
darkreading.comยท1d
๐Ÿฆ Malware Analysis
Flag this post