CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit
https://ift.tt/NKvthDu
Submitted March 18, 2026 at 01:04AM by Jaded_Unit_1223
via reddit https://ift.tt/3aoE4Pg
https://ift.tt/NKvthDu
Submitted March 18, 2026 at 01:04AM by Jaded_Unit_1223
via reddit https://ift.tt/3aoE4Pg
The new security frontier for LLMs; SIEM evasion
https://ift.tt/uE2YLve
Submitted March 18, 2026 at 02:21AM by Pitiful_Table_1870
via reddit https://ift.tt/7bY4yn8
https://ift.tt/uE2YLve
Submitted March 18, 2026 at 02:21AM by Pitiful_Table_1870
via reddit https://ift.tt/7bY4yn8
Medium
The new security frontier for LLMs; SIEM evasion
Daniel Knight, CEO at Vulnetic
ACP — Cryptographic admission control for autonomous agent actions (Ed25519, anti-replay, delegation chains)
https://ift.tt/uRrcAJN
Submitted March 18, 2026 at 01:52AM by Ambitious-Leg-2179
via reddit https://ift.tt/fl7aBVE
https://ift.tt/uRrcAJN
Submitted March 18, 2026 at 01:52AM by Ambitious-Leg-2179
via reddit https://ift.tt/fl7aBVE
Zenodo
Agent Control Protocol: Admission Control for Agent Actions
Agent Control Protocol (ACP) is a formal technical specification for governance ofautonomous agents in B2B institutional environments. ACP is the admission controllayer between agent intent and system state mutation: before any agent action reachesexecution…
Operationalizing Mandiant's Attack Lifecycle, the Kill Chain, Mitre's ATT&CK, and the Diamond Model with Practical Examples
https://ift.tt/7b8EyO3
Submitted March 18, 2026 at 05:05AM by signalblur
via reddit https://ift.tt/cA7VHwW
https://ift.tt/7b8EyO3
Submitted March 18, 2026 at 05:05AM by signalblur
via reddit https://ift.tt/cA7VHwW
Magonia Research
Operationalizing Mandiant's Attack Lifecycle, the Kill Chain, Mitre's ATT&CK, and the Diamond Model with Practical Examples
From individual incident response to tracking adversaries across campaigns. Activity threading, analytic pivoting, and turning your own incidents into detection opportunities and structured threat intelligence.
Hyoketsu - Solving the Vendor Dependency Problem in Reverse Engineering
https://ift.tt/Gux4kog
Submitted March 18, 2026 at 06:11AM by Mempodipper
via reddit https://ift.tt/ej9bmgv
https://ift.tt/Gux4kog
Submitted March 18, 2026 at 06:11AM by Mempodipper
via reddit https://ift.tt/ej9bmgv
Searchlight Cyber
Hyoketsu – Solving the Vendor Dependency Problem in RE › Searchlight Cyber
The Long Decompilation Process Over the last eight or so years of performing security research at Assetnote, our research team has looked at countless enterprise applications that ship with hundreds, sometimes thousands, of vendor dependencies. This problem…
Hardware entropy is a coupled system
https://ift.tt/GPXkVbg
Submitted March 18, 2026 at 09:25AM by miapants19
via reddit https://ift.tt/r9YqP0y
https://ift.tt/GPXkVbg
Submitted March 18, 2026 at 09:25AM by miapants19
via reddit https://ift.tt/r9YqP0y
Amentilabs
Entropy Embedding Atlas | Amenti Labs
We embedded 58 hardware entropy sources into the same vector space. They are not independent.
AI infrastructure has a networking problem, zero-trust overlays can help
https://ift.tt/I9o8T5A
Submitted March 18, 2026 at 08:41AM by bgolat
via reddit https://ift.tt/xlA75eU
https://ift.tt/I9o8T5A
Submitted March 18, 2026 at 08:41AM by bgolat
via reddit https://ift.tt/xlA75eU
Defined Networking
AI infrastructure has a networking problem, zero-trust overlays can help - Defined Networking
As AI spending races toward $2.5 trillion, the network connecting it all has become the weakest link. Here's how zero-trust overlay networking addresses the security and connectivity challenges of distributed AI infrastructure.
Complex Systems Science theories in Security Engineering
https://ift.tt/YL8dXo6
Submitted March 18, 2026 at 10:01AM by lord_sql
via reddit https://ift.tt/jBw0fbx
https://ift.tt/YL8dXo6
Submitted March 18, 2026 at 10:01AM by lord_sql
via reddit https://ift.tt/jBw0fbx
www.securesql.info
From Biology to Bot: A Strategic Framework for Governed Agency in Security Engineering
We assume security is about static defense. We assume automation is always deterministic. We assume risk is managed by limiting access. Every single one of t...
The Most Organized Threat Actors Use Your ITSM (BMC FootPrints Pre-Auth Remote Code Execution Chains) - watchTowr Labs
https://ift.tt/2aEsZGR
Submitted March 18, 2026 at 03:37PM by dx7r__
via reddit https://ift.tt/eLi6odX
https://ift.tt/2aEsZGR
Submitted March 18, 2026 at 03:37PM by dx7r__
via reddit https://ift.tt/eLi6odX
watchTowr Labs
The Most Organized Threat Actors Use Your ITSM (BMC FootPrints Pre-Auth Remote Code Execution Chains)
SolarWinds. Ivanti. SysAid. ManageEngine. Giants of the KEV world, all of whom have ITSM side-projects.
ITSMs, as a group of solutions, have played pivotal roles in numerous ransomware gang campaigns - not only do they represent code running on a system…
ITSMs, as a group of solutions, have played pivotal roles in numerous ransomware gang campaigns - not only do they represent code running on a system…
Throwing a spark into FuelCMS
https://ift.tt/xhEn62q
Submitted March 18, 2026 at 04:50PM by dragosey
via reddit https://ift.tt/FdMaDBN
https://ift.tt/xhEn62q
Submitted March 18, 2026 at 04:50PM by dragosey
via reddit https://ift.tt/FdMaDBN
~72% of companies report incomplete recovery after incidents - insights from 80 SEC disclosures
https://ift.tt/XLJteI2
Submitted March 18, 2026 at 08:04PM by LordKittyPanther
via reddit https://ift.tt/pd1QOGo
https://ift.tt/XLJteI2
Submitted March 18, 2026 at 08:04PM by LordKittyPanther
via reddit https://ift.tt/pd1QOGo
www.dukesecurity.ai
SEC Cybersecurity Incidents Database | Duke Security
A list of SEC cybersecurity incidents, AI-tagged with Duke's incident taxonomy and enriched with additional context.
CVE PoC Search
https://ift.tt/USkQsBA
Submitted March 18, 2026 at 09:16PM by LumpyElk1604
via reddit https://ift.tt/8d213Iz
https://ift.tt/USkQsBA
Submitted March 18, 2026 at 09:16PM by LumpyElk1604
via reddit https://ift.tt/8d213Iz
WatchStack.io
AI Enriched PoC Intelligence | WatchStack.io
Track CVEs, CISA KEV, EPSS scores, and exploit intelligence in real time with WatchStack.io.