botMEnglish · 2 hours agoJA4 Fingerprinting Against AI Scrapers A Practical Guidewebdecoy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJA4 Fingerprinting Against AI Scrapers A Practical Guidewebdecoy.combotMEnglish · 2 hours agomessage-square0linkfedilink
botMEnglish · 14 hours agoNi8mare - Unauthenticated Remote Code Execution in n8n CVE-2026-21858plus-squarewww.cyera.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNi8mare - Unauthenticated Remote Code Execution in n8n CVE-2026-21858plus-squarewww.cyera.combotMEnglish · 14 hours agomessage-square0linkfedilink
botMEnglish · 2 days agoReverse engineering my cloud-connected e-scooter and finding the master key to unlock all scootersplus-squareblog.nns.eeexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkReverse engineering my cloud-connected e-scooter and finding the master key to unlock all scootersplus-squareblog.nns.eebotMEnglish · 2 days agomessage-square0linkfedilink
botMEnglish · 2 days agoProxying Flutter Traffic on Android with Claudeplus-squarerandywestergren.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProxying Flutter Traffic on Android with Claudeplus-squarerandywestergren.combotMEnglish · 2 days agomessage-square0linkfedilink
botMEnglish · 2 days agoA practical guide to finding soundness bugs in ZK circuitsplus-squaremedium.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA practical guide to finding soundness bugs in ZK circuitsplus-squaremedium.combotMEnglish · 2 days agomessage-square0linkfedilink
botMEnglish · 3 days agotailsnitch A security auditor and configuration checklist for Tailscale configurationsplus-squarewww.adversis.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linktailsnitch A security auditor and configuration checklist for Tailscale configurationsplus-squarewww.adversis.iobotMEnglish · 3 days agomessage-square0linkfedilink
botMEnglish · 5 days agoHardBit 4.0 Ransomware Evolutionlabs.jamessawyer.co.ukexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHardBit 4.0 Ransomware Evolutionlabs.jamessawyer.co.ukbotMEnglish · 5 days agomessage-square0linkfedilink
botMEnglish · 6 days agoWindows Registry Persistence Techniques without Registry Callbacksdeceptiq.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWindows Registry Persistence Techniques without Registry Callbacksdeceptiq.combotMEnglish · 6 days agomessage-square0linkfedilink
botMEnglish · 6 days agoTechnical Analysis - MongoBleed CVE-2025-14847 Memory Corruption in MongoDBplus-squarephoenix.securityexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTechnical Analysis - MongoBleed CVE-2025-14847 Memory Corruption in MongoDBplus-squarephoenix.securitybotMEnglish · 6 days agomessage-square0linkfedilink
botMEnglish · 6 days agoLooking for fitting mystery guest certificationplus-squareanti-crime-academy.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLooking for fitting mystery guest certificationplus-squareanti-crime-academy.combotMEnglish · 6 days agomessage-square0linkfedilink
botMEnglish · 7 days agobuilt an SSRF prevention libraryplus-squarewww.npmjs.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkbuilt an SSRF prevention libraryplus-squarewww.npmjs.combotMEnglish · 7 days agomessage-square0linkfedilink
botMEnglish · 7 days agornetsec monthly discussion tool threadwww.reddit.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkrnetsec monthly discussion tool threadwww.reddit.combotMEnglish · 7 days agomessage-square0linkfedilink
botMEnglish · 7 days agoThe Story of a Perfect Exploit Chain Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Applianceplus-squaremehmetince.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Story of a Perfect Exploit Chain Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Applianceplus-squaremehmetince.netbotMEnglish · 7 days agomessage-square0linkfedilink
botMEnglish · 9 days agoRMM Abuse in a Crypto Wallet Distribution Campaignplus-squaremalwr-analysis.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRMM Abuse in a Crypto Wallet Distribution Campaignplus-squaremalwr-analysis.combotMEnglish · 9 days agomessage-square0linkfedilink
botMEnglish · 10 days ago39C3 Multiple vulnerabilities in GnuPG and other cryptographic toolsplus-squarewww.heise.deexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link39C3 Multiple vulnerabilities in GnuPG and other cryptographic toolsplus-squarewww.heise.debotMEnglish · 10 days agomessage-square0linkfedilink
botMEnglish · 11 days agoIdentity misuse that looks completely normalplus-squarewww.armosec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIdentity misuse that looks completely normalplus-squarewww.armosec.iobotMEnglish · 11 days agomessage-square0linkfedilink
botMEnglish · 12 days agoMongobleed - CVE-2025-14847plus-squaredoublepulsar.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMongobleed - CVE-2025-14847plus-squaredoublepulsar.combotMEnglish · 12 days agomessage-square0linkfedilink
botMEnglish · 12 days agoEarly warning signs of runtime compromiseplus-squarewww.armosec.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkEarly warning signs of runtime compromiseplus-squarewww.armosec.iobotMEnglish · 12 days agomessage-square0linkfedilink
botMEnglish · 12 days agoImplicit execution authority is the real failure mode behind prompt injectionplus-squarezenodo.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImplicit execution authority is the real failure mode behind prompt injectionplus-squarezenodo.orgbotMEnglish · 12 days agomessage-square0linkfedilink
botMEnglish · 12 days agoPetlibro Your Pet Feeder Is Feeding Data To Anyone Who Asksplus-squarebobdahacker.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPetlibro Your Pet Feeder Is Feeding Data To Anyone Who Asksplus-squarebobdahacker.combotMEnglish · 12 days agomessage-square0linkfedilink