[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
/r/netsec
New OpenSecurityTraining2 mini-class: "Debuggers 1102: Introductory Ghidra"
PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem
go-exploit Goes Scanless
Think Twice Before Cheating: Escape From Tarkov Cheat Developer Steals User Data.
Unfashionably secure: why we use isolated VMs
Anyone can Access Deleted and Private Repository Data on GitHub
Studying 0days: How we hacked Anki, the world's most popular flashcard app
Let’s Encrypt Intent to End OCSP Service
NO_WILDCARD: How we discovered the AWS Organization ID for any AWS Account
CVE-2019-8805: Apple EndpointSecurity framework Privilege Escalation
/r/Malware
Malware Analysis
Non exe based attacks
Capev2 installation
Realistic Sample Collecting
Botting, Hooking, and More: Uncover the Secrets of Modern Game Cheating
Think Twice Before Cheating: Escape From Tarkov Cheat Developer Steals User Data.
A tool to decrypt stored passwords from Google Chrome.
Any advice for a beginner in the security field
Starting as Freelance (Cybersecurity / Malware Analysis / Reverse Engineering)
VulneraKey: A Tool for Analyzing AHK Scripts for Malware 🚀
/r/pwned
Australians among 560 million users around the world caught in Ticketmaster hack
26,818,266 compromised accounts from The Post Millenial conservative news site on May 2, 2024.
AT&T Breach: 73,481,539 records including SSN, DOB, Phone, Addresses, Emails, and other Info being sold online
More than 15,000 Roku accounts compromised in data breach; hackers were able to buy subscription services and sound bars using credit cards on file because Roku didn't use 2FA
UnitedHealth blames a ‘nation-state’ for a hack disrupting pharmacy orders
Personal information of over 50,000 Bank of America customers exposed in breach attributed to Infosys McCamish Systems (IMS)
Integris Health Data Breach Could Impact Millions
Inside the Massive Naz.API Credential Stuffing List
State of the sub: Reopened
University of Manchester announces cyber incident, says data ‘likely’ copied
/r/blackhat
Looking for Experienced/Intermediate CTF Players for an upcoming CTF
Hacking servers on discord
How can stored XSS vulnerability lead to cookie stealing? Practical Training Scenario
Can Engineers Stage a Coup and Take Over Their Company?
Infostealer Infection Results in Data Breach of Blockchain Identity Platform, Fractal ID
WebRTC IP Leaking Advice Wanted
cant find any blackhat and/or hacktivisits communities
EternalBlue automation issue.
NoSQL Injection For Beginners | TryHackMe NoSQL Injection
What are the best approaches to running python scripts on Windows devices that have no Python interpreter?
/r/websec
How allowing many features of https:// protocol to a file:/// scheme would introduce security vulnerabilities?
How to Remove APIs and Source Code from Attackers’ View?
Top 7 Web Application Security Best Practices to Safeguard Your Sensitive Data
What do you think of report-uri.com?
Am I in Trouble ???
How to Use Socket to Find out if You Were Affected by the Backdoored xz Package (including full list of npm, PyPI, and Go packages that bundle or link to xz)
Advanced Prototype Pollution Scanner
Personal VPNs Can Be Shady, but Should Companies Ban Them?
@npm_malware tweets real-time malware threats detected on NPM
Understanding Data Breach: An Expert's Guide
/r/computerforensics
Fixing "Swap Error" When Using Volatility with VirtualBox
What degree/certificate should I look for.
Gathering data - Company
Encase
Metadata Dilemma
CHFI exam
Computer forensics project
Announcing the incident response program pack 1.0
TikTok Drafts Data Not Backing Up or Restoring
Registry Forensics
/r/xss
Can someone explain this XSS?
How can stored XSS vulnerability lead to cookie stealing? Practical Training Scenario
Unescape room
Cross Site Scripting in TCL US website
how top bypass double quotes in markdown based website?
How much shorter can we make this?
Simple Reflected XSS Vulnerability Scanner Script
Unsolved challenge seen in a real world web page (reflected XSS potential) - have at it!
Form POSTs are now URL encoded
Sending unencoded URL in modern browser
/r/cybersecurity
Unmasking the Telegram Exploit - A Cybersecurity Breakdown with Lukas St...
Designing a Technical Interviews
Burp suite certified practioner
Microsoft SQL Server encryption docs - inaccurate info
Cloud security or overall
North Korean hacker got hired by US security vendor, immediately loaded malware | Ars Technica
Implementing DLP for Securing Source Code and Final Product Data
So I just got jumped in a meeting...
North Korean Military Hacker Indicted for String of US Attacks
Russian ransomware gangs account for 69% of all ransom proceeds
/r/crypto
ZKnews / ZKsecurity - a cryptography forum
Contributing to Crypto APIs on My Spare Time
Flaws with FIPS-140-2/3 Certification?
Which Projects Use GNUTLS in Real Life?
Most Important Skills to Learn for Cryptographic Engineering Outside of Work
KU Leuven COSIC have put up a collection of lectures online
Most Used Languages to Program Cryptography in Production?
The Importance of Refactoring and Working with Legacy Code in Crypto
Transitioning from an existing stream-ciphered (TCP) stream to a TLS connection, keeping the same security assumptions
Writeup on the Groth16 zkSNARK with a toy implementation in Sagemath
/r/HackBloc
Hactivists say they hacked Belarus rail system to stop Russian military buildup
Can anyone here be my free "hacker friend"?
Reccomendations
The Internet's Own Boy - The Story of Aaron Swartz
Hacktivism as a social movement is back
Why did no one show up to the MMM in Los Angeles?
where do I find a million mask march meetup?
Firewall dropping me off from an ssh connection
[1 Minute] Cool Tool Friday: How to Bypass ANY Paywall!
Docker for CTFs (Application Virtualization)
© 2024 RiskDiscovery | Sponsored by:
Deception Logic