sign up
sign up
sign up
sign up
pull down to refresh
New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations
cybersecuritynews.com/kerberos-relay-attack-uses-dns-cname/amp/
60 sats
\
0 comments
\
@ch0k1
20 Jan
news
related
Not in The Prophecies: Practical Attacks on Nostr
crypto-sec-n.github.io/
4110 sats
\
7 comments
\
@ek
7 Aug 2025
nostr
Not Sealed: Practical Attacks on Nostr
www.blackhat.com/us-25/briefings/schedule/#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726
393 sats
\
3 comments
\
@ek
30 Jul 2025
crypto
FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks
thehackernews.com/2024/02/fbi-warns-us-healthcare-sector-of.html
140 sats
\
0 comments
\
@doofus
28 Feb 2024
security
Understanding the Twitter Hack of 2020: A Deep Dive
1001 sats
\
3 comments
\
@Daniela
5 Jan 2024
security
Active Directory as a critical attack point.
41 sats
\
1 comment
\
@shurikencutter
7 Mar 2023
bitcoin
Alby unusual request during the night....
primal.net/e/nevent1qqswh5upmuma0h89vdnh7pnk6ap637xg0mtt0k32hwaxrxm98vuv28c3euur7
265 sats
\
1 comment
\
@Gian
21 Oct 2025
security
Microsoft: New critical Exchange bug exploited as zero-day
www.bleepingcomputer.com/news/security/microsoft-new-critical-exchange-bug-exploited-as-zero-day/
62 sats
\
0 comments
\
@ch0k1
15 Feb 2024
security
Account compromise of “unprecedented scale” uses everyday home devices
arstechnica.com/security/2024/04/everyday-devices-are-used-to-hide-ongoing-account-compromise-campaign/
315 sats
\
0 comments
\
@nym
29 Apr 2024
security
CISA orders feds to patch actively exploited Dell flaw within 3 days
www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/
163 sats
\
0 comments
\
@winteryeti
23 Feb
tech
Okta warns of "unprecedented" credential stuffing attacks on customers
www.bleepingcomputer.com/news/security/okta-warns-of-unprecedented-credential-stuffing-attacks-on-customers/
1147 sats
\
0 comments
\
@DEADBEEF
28 Apr 2024
security
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infra
thehackernews.com/2026/03/web-server-exploits-and-mimikatz-used.html
50 sats
\
0 comments
\
@ch0k1
9 Mar
news
Not like this: researchers pen open letter on the dangers of age verification
www.pcgamer.com/hardware/scientists-warn-against-crappy-age-verification-if-implemented-without-careful-consideration-the-new-regulation-might-cause-more-harm-than-good/
404 sats
\
1 comment
\
@Scoresby
4 Mar
tech
Politics_And_Law
Hackers Exploiting 3-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls
cybersecuritynews.com/fortigate-firewall-vulnerability/
117 sats
\
0 comments
\
@ch0k1
26 Dec 2025
news
Linux Kernel Vulnerability Let Attackers Escalate Privilege - PoC Released
cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/
136 sats
\
0 comments
\
@ch0k1
23 Apr 2025
security
SMTP Smuggling: New Flaw Lets Attackers Bypass Security and Spoof Emails
thehackernews.com/2024/01/smtp-smuggling-new-threat-enables.html?m=1
1266 sats
\
3 comments
\
@RDClark
3 Jan 2024
security
HTTP Status Codes: A Guide for Developers
138 sats
\
0 comments
\
@BytePhysics
8 Jan 2024
devs
Running mutinynet - or am I?
1092 sats
\
8 comments
\
@ek
22 Nov 2023
bitcoin
freebie
Password managers less secure than promised - Samuel Schlaefli
ethz.ch/en/news-and-events/eth-news/news/2026/02/password-managers-less-secure-than-promised.html
1638 sats
\
24 comments
\
@Scoresby
16 Feb
news
tech
Credential Stuffing - What is a Credential Stuffing Attack?
salt.security/blog/credential-stuffing-what-is-credential-stuffing-and-how-to-defend-against-credential-stuffing
132 sats
\
1 comment
\
@Gian
12 Apr 2024
security
20-Year-Old macOS Vulnerability Allows Attackers To Gain Root Access Remotely
cybersecuritynews.com/20-years-old-macos-vulnerability/
180 sats
\
6 comments
\
@ch0k1
28 Nov 2024
security
Massive IP Spoofing attack targeting Tor Relay Operators
delroth.net/posts/spoofed-mass-scan-abuse/
1517 sats
\
4 comments
\
@eltordev
7 Nov 2024
security
more