Mining Exploit Intelligence to develop custom Nuclei templates for CVE, EUVD, CNNVD & BDU. This article covers how mining intelligence linked to vulnerability identifiers like CVE, EUVD, CNNVD, and BDU can be helpful in developing custom Nuclei templates and extending its coverage, supporting the growing community of security teams, researchers, and ASM providers.
Passive Subdomain Enumeration: Uncovering More Subdomains than Subfinder & Amass Subdomain Center notes over 200 competitors, yet Amass integrates 87 and Subfinder 45; this article explores better subdomain enumeration tools.
Combating the Darkest Depths of Cyber Intelligence: The Pall Mall Process & Commercial Surveillance Vendors Spyware is getting out of control. We need a unified process and oversight mechanism to ensure its responsible use. Is the Pall Mall Process going to be the solution?