[
News
|
Newsletters
|
Blogs
|
Lists
|
Media
|
Jobs
]
HoneyDB
[
privacy
|
malware
|
research
|
vendor
]
Wiz - Incidents
NCC Group Research
Euro 7 Anti-tampering and the Expanding Cybersecurity Landscape
Story of a Hundred Vulnerable Jenkins Plugins
Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
In-Depth Technical Analysis of the Bybit Hack
EAP-TLS: The most secure option?
Research Paper – Machine Learning for Static Malware Analysis, with University College London
Black Hole of Trust: SEO Poisoning in Silver Fox’s Space Odyssey
Writing Robust Yara Detection Rules for Heartbleed
Working with the Open Technology Fund
An offensive guide to the Authorization Code grant
Threat Research - Sophos
The OpenClaw experiment is a warning shot for enterprise AI security
The OpenClaw experiment is a warning shot for enterprise AI security
February’s Patch Tuesday assumes battle stations
Sophos Firewall Configuration Viewer
Malicious use of virtual machine infrastructure
Sophos Workspace Protection Enables Safe GenAI Adoption
From Security Operations to Security Leadership: Sophos CISO Advantage
Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Threat Intelligence Executive Report – Volume 2025, Number 6
Malicious use of virtual machine infrastructure
PortSwigger Research
Top 10 web hacking techniques of 2025
Top 10 web hacking techniques of 2025: call for nominations
The Fragile Lock: Novel Bypasses For SAML Authentication
Introducing HTTP Anomaly Rank
WebSocket Turbo Intruder: Unearthing the WebSocket Goldmine
Cookie Chaos: How to bypass __Host and __Secure cookie prefixes
Inline Style Exfiltration: leaking data with chained CSS conditionals
Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling
HTTP/1.1 must die: the desync endgame
Repeater Strike: manual testing, amplified
Google Project Zero
AI Research - Sophos
The OpenClaw experiment is a warning shot for enterprise AI security
The OpenClaw experiment is a warning shot for enterprise AI security
February’s Patch Tuesday assumes battle stations
Sophos Firewall Configuration Viewer
Malicious use of virtual machine infrastructure
Sophos Workspace Protection Enables Safe GenAI Adoption
From Security Operations to Security Leadership: Sophos CISO Advantage
Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Threat Intelligence Executive Report – Volume 2025, Number 6
Malicious use of virtual machine infrastructure
Unit 42
Phishing on the Edge of the Web and Mobile Using QR Codes
Nation-State Actors Exploit Notepad++ Supply Chain
A Peek Into Muddled Libra’s Operational Playbook
Novel Technique to Detect Cloud Threat Actor Operations
The Shadow Campaigns: Uncovering Global Espionage
Why Smart People Fall For Phishing Attacks
Privileged File System Vulnerability Present in a SCADA System
Understanding the Russian Cyberthreat to the 2026 Winter Olympics
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
Talos Intelligence
Hand over the keys for Shannon’s shenanigans
Ryan Liles, master of technical diplomacy
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities
All gas, no brakes: Time to come to AI church
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
I'm locked in!
Microsoft releases update to address zero-day vulnerability in Microsoft Office
Dissecting UAT-8099: New persistence mechanisms and regional focus
IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations
© 2026 RiskDiscovery | Sponsored by:
Deception Logic