Skip to main content
Security
Menu
Search
Search
Main navigation
Home
Vulns-recent
Exploit-DB
Report
Blog
Privacy Policy
Search
Search
User account menu
Log in
Sources
Zero Day Initiative
The December 2025 Security Update Review
Zero Day Initiative
The November 2025 Security Update Review
Zero Day Initiative
Pwn2Own Ireland 2025: Day Three and Master of Pwn
Zero Day Initiative
More
posts about Zero Day Initiative
Malware on MSRC
Microsoft addresses App Installer abuse
Malware on MSRC
Customer Guidance for the Dopplepaymer Ransomware
Malware on MSRC
「Emotet」の大規模感染を阻止した人工知能のしくみ
Malware on MSRC
More
posts about Malware on MSRC
Anyrun
AI Sigma Rules: Scale Threat Detection, Drive Down MTTR
Anyrun
Phishing Kit Attacks 101: Everything SOC Analysts Should Know
Anyrun
Track Evolving Cyber Threat Landscape for Your Industry & Country in Real Time
Anyrun
More
posts about Anyrun
The Blue Team Diaries
Navigating the AI Revolution in Cybersecurity: An Investor's Perspective
The Blue Team Diaries
Blue Team Diaries E015: Tony Wilson
The Blue Team Diaries
Blue Team Diaries E014: TJ Nelson
The Blue Team Diaries
More
posts about The Blue Team Diaries
HTB Blog > Red Teaming
New Pro Labs arrive with a limited-time discount
HTB Blog > Red Teaming
PwnOS: From Admin to Root—Exploiting CVE-2024-9474
HTB Blog > Red Teaming
Summon your strength for Season 9: GACHA
HTB Blog > Red Teaming
More
posts about HTB Blog > Red Teaming
HTB > CVE Explained
Inside CVE-2025-32711 (EchoLeak): Prompt injection meets AI exfiltration
HTB > CVE Explained
CVE-2024-47176 explained: Understanding the CUPS vulnerability
HTB > CVE Explained
Reading arbitrary files via Jenkins' CLI: CVE-2024-23897 explained
HTB > CVE Explained
More
posts about HTB > CVE Explained
HTB > Blue Teaming
Blue team resilience: The skills, simulations, and reporting SOCs actually want
HTB > Blue Teaming
Detecting USB-based cyber attacks: A guide
HTB > Blue Teaming
Stop the alert overload: How to train like you’re actually under attack
HTB > Blue Teaming
More
posts about HTB > Blue Teaming
FreeBuf互联网安全新媒体平台
APISandbox:使用go作为后端实现解释OWASP API Top 10的漏洞
FreeBuf互联网安全新媒体平台
SWE-agent:开源工具利用大语言模型修复GitHub仓库问题
FreeBuf互联网安全新媒体平台
"Cookie-Bite"攻击手法可绕过多重验证并维持持久访问权限
FreeBuf互联网安全新媒体平台
More
posts about FreeBuf互联网安全新媒体平台
安全客
数据安全“护城河”:全一科技用专业方案守护企业核心资产
安全客
最高危漏洞引爆T级DDoS海啸!React、Next.js用户集体告急
安全客
类人智能赋能:谷歌翻译获 Gemini 升级,实现俚语精准翻译与语气还原
安全客
More
posts about 安全客
Seebug Paper
强网杯S9 Real World - monotint
Seebug Paper
VulnLLM-R:基于智能体框架的漏洞检测专用推理大语言模型
Seebug Paper
Typhon: 一种 pyjail 自动化绕过的思路及其粗略实现
Seebug Paper
More
posts about Seebug Paper
Pagination
First page
Previous page
…
Page
43
Page
44
Page
45
Page
46
Page
47
Page
48
Page
49
Page
50
Page
51
…
Next page
Last page
Managed ad
RSS feed