home
-
all
|
technology
-
piracy
-
selfhosted
-
world
-
linux
-
memes
-
asklemmy
-
nostupidquestions
-
mildlyinfuriating
-
games
-
youshouldknow
-
technology
-
showerthoughts
-
fediverse
-
technology
-
asklemmy
-
lemmyshitpost
-
programmerhumor
-
gaming
-
worldnews
-
more »
log in
or
sign up
|
settings
digicat
overview
[+]
[–]
digicat
joined 2 years ago
MODERATOR OF
blueteamsec
sorted by:
new
top
controversial
old
3
NETGEAR Devices Hidden Page List
(github.com)
submitted
3 days ago
by
digicat
to
c/blueteamsec
1 comments
fedilink
2
Leveraging ETW for Advanced Threat Detection
(www.nextron-systems.com)
submitted
3 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
2
Attack Graph Model Design Requirements and Examples
(specterops.io)
submitted
3 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
2
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
(arxiv.org)
submitted
3 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
3
Why continuous profiling is the fourth pillar of observability
(www.datadoghq.com)
submitted
3 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
3
Let’s get Digital! Updated Digital Identity Guidelines are Here! NIST
(www.nist.gov)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
3
Advisory on North Korean information technology (IT) workers - mid-July Canadian government
(rcmp.ca)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
3
hashcat v7.0.0
(hashcat.net)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
3
Dreigingslandschap Vitale Infrastructuur (2025) - Threat Landscape Critical Infrastructure (2025)
(www.nctv.nl)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
2
The 26th Annual Hawke Lecture: Counting and countering the cost of espionage - "Often it’s a combination of both, where cyber-espionage enables in-person espionage or in-person espionage begets cyber-
(www.asio.gov.au)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
2
OpenImporter: Middleware utility for enriching and uploading data gathered with arbitrary collectors to more effectively map to existing Bloodhound database objects.
(github.com)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
1
Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence
(www.splunk.com)
submitted
4 days ago
by
digicat
to
c/blueteamsec
0 comments
fedilink
view more:
‹ prev
next ›