Mitre ATT&CK v18 released
medium.comยท8hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Know Your Assets, Know Your Normal: A Practical Guide to OT Baselining
emberot.comยท1dยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
Show HN: KeyLeak Detector โ€“ Scan websites for exposed API keys and secrets
github.comยท13hยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
The Great Firewall Part 1: The Dump
dti.domaintools.comยท2dยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
Canada Says Hackers Tampered with ICS at Water Facility, Oil and Gas Firm
securityweek.comยท2dยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
Alta Router marketed as IPS not IPS
forum.alta.incยท1hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Flag this post
HTTP desync attacks: request smuggling reborn
portswigger.netยท1dยท
Discuss: Hacker News
๐ŸeBPF
Flag this post
EY 4TB Data Leak
neosecurity.nlยท3dยท
Discuss: Hacker News
๐Ÿ”Ghidra
Flag this post
What Good Software Supply Chain Security Looks Like
thenewstack.ioยท3dยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
Malicious packages in NPM evade dependency detection through invisible URL links
csoonline.comยท1dยท
Discuss: Hacker News
๐Ÿ‘ปRootkits
Flag this post
Security Community Slams MIT-linked Report Claiming AI Powers 80% of Ransomware
socket.devยท2dยท
Discuss: Hacker News
๐Ÿฆ Malware Analysis
Flag this post
Two Windows vulnerabilities, one a 0-day, are under active exploitation
arstechnica.comยท1dยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
Vibecoding my way to a crit on GitHub
furbreeze.github.ioยท1hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post
OpenAI unveils Aardvark, a GPT-5-powered agent for cybersecurity research
zdnet.comยท2dยท
Discuss: Hacker News
๐Ÿ›Fuzzing
Flag this post
Nuclear Reactor Slated to Repurpose Coal-Burning Power Plants (2023)
holtecinternational.comยท16hยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
Beginners Guide to Building a Hardware Hacking Lab
voidstarsec.comยท1dยท
Discuss: Hacker News
๐Ÿ”Reverse Engineering
Flag this post
China-linked hackers exploited Lanscope flaw as a zero-day in attacks
bleepingcomputer.comยท20hยท
๐Ÿ”Hardware Security
Flag this post
When APIs Become Attack Paths: What the Q3 2025 ThreatStats Report Tells Us
lab.wallarm.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฆSandboxing
Flag this post
Smaller Surfaces
nrempel.comยท14hยท
Discuss: Hacker News
๐Ÿฆ€Rust
Flag this post