[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
/r/netsec
Go Big or GO HOME!
I'm The Captain Now: Hijacking a global ocean supply chain network
Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover
Bad Vibes: Comparing the Secure Coding Capabilities of Popular Coding Agents
Fortinet Forticlient EMS RCE CVE-2025-59922 and one IMG tag to rule them all
CVE-2025-64155: 3 Years of Remotely Rooting the Fortinet FortiSIEM
Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
Astaroth’s Boto Cor-de-Rosa campaign targets Brazil with new WhatsApp malware technique
A common denominator in AI agent framework CVEs: Validation
Game-theoretic feedback loops for LLM-based pentesting: doubling success rates in test ranges
/r/Malware
New(ish) W11 PC owned by MiL
The Triton System Attack: The Most Dangerous Malware Ever Discovered
am i hacked
Malware scan recs
Floxif File Infector Analysis with Binary Ninja
Windows XP professional and Virtual Network
Alert before you download orca slicer
Building an Android malware behavior analysis tool — looking for ideas on what to automate next
Exploiting a vulnerable driver to kill Windows Defender and deploy WannaCry
What general precautions should I take when testing an app from untrusted source in VM
/r/pwned
How I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
DoorDash says personal information of customers, dashers stolen in data breach
July 2025 Hack Report: China, CRM Clouds, Ransomware—and Yes, "123456"
May 2025 Hack Report: Healthcare, Logistics, Tech—and Yes, LockBit
Britain’s Companies Are Being Hacked
Loopscale Breach Twist: Hacker Offers to Return Funds for 20%
Data breaches you might have missed this month
Thousands of Records, Including PII, Exposed Online in Healthcare Marketplace Connecting Facilities and Nurses Data Leak
Anna Jaques Hospital ransomware breach exposed data of 300K patients
Hot Topic Breach Confirmed, Millions of Credit Cards Exposed
/r/blackhat
The Triton System Attack: The Most Dangerous Malware Ever Discovered
Breachforums
Where do you buy your equipment?
Looking for tool that generate spammy backlinks
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk (TBs of data is actively being sold by a hacker affiliated with a ransomware group)
How to copy my files undetected
From Victim to Vector: How Infostealers Turn Legitimate Businesses into Malware Hosts
Snapchat
The Industrialization of “ClickFix”: Inside ErrTraffic (New Delivery Method)
WIRED Database Leaked: 40 Million Record Threat Looms for Condé Nast
/r/websec
Jio scam , software error
Jaguar Land Rover Cyberattack 2025: What Happened and Its Impact
Fast, Dynamic ... and Insecure? Rethinking Web App Security in the Modern Era
What’s your go-to method for keeping malicious sites from ever reaching end users?
Im a security researcher and i've made MCP server to search for vulnerabilities
My New PenTesting tool on the block for bug bounties!
How do these illegal clear web websites accept bank payments?
Bitcoin Casinos
Need your advice for bug hunting
I made a FOSS tool for observable / IoC analysis (domain, URL, IP, hash)
/r/computerforensics
FOR500 2024 still good in 2026?
Digital Forensics resources for university exam
When do digital images stop being trustworthy forensic evidence?
CRU WriteBlocking Validation Utility
help me to install Autopsy on my mac air m2(8, 256gb)
boitier pc pour workstatino forensic
Would you use this in audio forensic work?
What are your expectations for digital forensics in 2026?
Imagine raid 5 nas synology
User Guide
/r/xss
I need your help 🙏 1–2 min XSS survey for my bachelor’s thesis
Reflected response in text/plain
Escaping double quotes
Turning List-Unsubscribe into an SSRF/XSS Gadget
Why XSS still matters: MSRC’s perspective on a 25-year-old threat
Unable to change dalfox's parameters to have a custom value instead of default
How come this cloudflare XSS bypass works?
XSS-Leak: Leaking Cross-Origin Redirects
Bug Bounty Write-up - DOM XSS
Integrity Policy Header
/r/cybersecurity
Those who got hybrid/remote roles, what's your advice? I suck at small talk but I am experienced etc.
U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare
Will security awareness training be substituted with simulations?
Extreme demotivation
FedVTE vs CISA Learning --- alternatives?
Hacking a Spytec Chinese GPS Tracker - Spoofing Location Data
DeadLock ransomware is hiding C2 infrastructure in Polygon smart contracts (and it's working)
Checkbox detection on scanned legal forms is driving me insane
What topic should I invest my time into this year?
NSA Releases First in Series of Zero Trust Implementation Guidelines
/r/crypto
The State of OpenSSL for pyca/cryptography
Do non anomalous curves expressed over a local p adic field have embedding degrees?
ASCON-128 RTL(pure verilog)failing NIST test vectors
Does the discrete logarithm problem can be transfered to a p-adic/local field from a large finite field? (Not asking how but if it would be helpfull)
Toward solving computational diffie Hellman on altbn128? An implementation for performing practical Miller s algorithm inversion over altbn128 in polynomial time.
Cryptographic Failures Drops to 4th Place in OWASP Top Ten 2025
Practical Collision Attack Against Long Key IDs in PGP
Psi-commit cryptographic commitment scheme?
Verifiable brute force strength rates across different projects
I am the author of The Joy of Cryptography, which is finally in print today. Ask me anything.
/r/HackBloc
Hactivists say they hacked Belarus rail system to stop Russian military buildup
Can anyone here be my free "hacker friend"?
Reccomendations
The Internet's Own Boy - The Story of Aaron Swartz
Hacktivism as a social movement is back
Why did no one show up to the MMM in Los Angeles?
where do I find a million mask march meetup?
Firewall dropping me off from an ssh connection
[1 Minute] Cool Tool Friday: How to Bypass ANY Paywall!
Setup a Computer, Inside Your Computer (Virtualization)
© 2026 RiskDiscovery | Sponsored by:
Deception Logic