Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·1d
🛡️eBPF Security
Flag this post
NetBSD NAT64 Protocol Translation Enhancements Part 2
discoverbsd.com·6h
🛡️eBPF Security
Flag this post
How to Data Engineer the ETLFunnel Way
dev.to·4h·
Discuss: DEV
🌊Stream Processing
Flag this post
Show HN: Using GitHub Pages as zero-cost APT repository with global CDN
vejeta.com·3h·
Discuss: Hacker News
❄️Nix Flakes
Flag this post
After VMware: Managing end-of-life for Proxmox Hypervisors
runzero.com·1d
💿Proxmox HA
Flag this post
FFpropaganda
codecs.multimedia.cx·17h
🎞️FFmpeg Filters
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.com·14h·
Discuss: Hacker News
🎯Threat Hunting
Flag this post
This Week in Security: Vibecoding, Router Banning, and Remote Dynamic Dependencies
hackaday.com·1d
🔓Hacking
Flag this post
Linux 6.18 Kernel Happenings, Python 3.14, NTFSPLUS & Other October Highlights
phoronix.com·10h
🔌Operating system internals
Flag this post
Wireguard on demand on Windows
reddit.com·2d·
Discuss: r/homelab
📡Network Monitoring
Flag this post
Evaluating YARA Rules for macOS Malware Hunting in Spectra Analyze
reversinglabs.com·2d
🦠Malware Analysis
Flag this post
aperf: A CLI tool to gather performance data and visualize using HTML graphs
github.com·1d·
Discuss: Hacker News
🔍eBPF
Flag this post
The researcher’s desk: CVE-2025-20362
blog.detectify.com·1d
🔓Hacking
Flag this post
The best free VPNs in 2025
engadget.com·1d
🌐WebRTC Archives
Flag this post
Evolving PHP Streams for Async, Security, and Performance
thephp.foundation·2d·
Discuss: Hacker News
🌊Streaming Systems
Flag this post
Best Linux Distros for Development
thenewstack.io·3h
🔌Operating system internals
Flag this post
When eBPF Isn't Enough: Why We Went with a Kernel Module
riptides.io·4d·
Discuss: Hacker News
🛡️eBPF Security
Flag this post
Denial-of-Service (DoS) Attacks: What They Are, How They Work, and How to Defend Your Site
blog.sucuri.net·1d
🌐DNS Security
Flag this post
China-linked UNC6384 exploits Windows zero-day to spy on European diplomats
securityaffairs.com·7h
🎫Kerberos Exploitation
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·2d
🌐DNS Security
Flag this post