Loadingโ€ฆ

Whats The Hax?

Daily intelligence on threats, breaches, and defenders

What's New

Top 5 Across All Sources
  1. JHT Course Launch: Web App Junior Analyst!

    John Hammond ยท 2d ago
  2. A Guide to LNK File Forensics

    The Cyber Mentor ยท 2d ago
  3. Josh Mason | Real Folks of Cyber | DITL

    The Cyber Mentor ยท 4d ago
Latest
David BombalDual Boot Windows and Ubuntu Linux in 10 Minutes (2026)John HammondJHT Course Launch: Web App Junior Analyst!The Cyber MentorA Guide to LNK File ForensicsHak5Why You Must Check Your Password Manager Immediately | THREAT WIREThe Cyber MentorJosh Mason | Real Folks of Cyber | DITLBlack HatSecTor 2025 | Not-So-Secret Agents: Deploying AI to Optimize Security OperationsProofpoint News FeedClaude Mythos Fears Startle Japan's Financial Services SectorDEFCONConferenceDEF CON 34 - DEF CON Policy Announcement - Katie Noble, Heather WestDavid BombalThey got hacked and now you will get attacked โ˜น๏ธBlack HatWhy Black Hat is Essential for Academics | Black Hat StoriesProofpoint News FeedAI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI AssistantsProofpoint News FeedProofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in PlaceBlack HatWhat Makes Black Hat Truly Shine | Black Hat StoriesBlack HatSecTor 2025 | AI, Deepfakes, and the Next Evolution of Digital Identity VerificationBlack HatSecTor 2025 | Security and Safety Testing for Agentic AINahamSecThis hacker made $40,000 using Claude #ai #hacking #bugbountyJohn HammondFAKE Zoom Taxes MALWARENahamSecMy Friend Made $40,000 Using Claude Code (Here's How)NetworkChuckLearn networking with REAL labs ๐Ÿ‘‰ Join the Summer of CCNABlack HatSecTor 2025 | Quantifying Cyber Risk as a National Defense ImperativeDavid BombalDual Boot Windows and Ubuntu Linux in 10 Minutes (2026)John HammondJHT Course Launch: Web App Junior Analyst!The Cyber MentorA Guide to LNK File ForensicsHak5Why You Must Check Your Password Manager Immediately | THREAT WIREThe Cyber MentorJosh Mason | Real Folks of Cyber | DITLBlack HatSecTor 2025 | Not-So-Secret Agents: Deploying AI to Optimize Security OperationsProofpoint News FeedClaude Mythos Fears Startle Japan's Financial Services SectorDEFCONConferenceDEF CON 34 - DEF CON Policy Announcement - Katie Noble, Heather WestDavid BombalThey got hacked and now you will get attacked โ˜น๏ธBlack HatWhy Black Hat is Essential for Academics | Black Hat StoriesProofpoint News FeedAI-Era Threats Spread Beyond Email Into SaaS, Collaboration Apps, and AI AssistantsProofpoint News FeedProofpoint Research Reveals Half of Global Organizations Experienced AI Incidents Despite Having AI Security Controls in PlaceBlack HatWhat Makes Black Hat Truly Shine | Black Hat StoriesBlack HatSecTor 2025 | AI, Deepfakes, and the Next Evolution of Digital Identity VerificationBlack HatSecTor 2025 | Security and Safety Testing for Agentic AINahamSecThis hacker made $40,000 using Claude #ai #hacking #bugbountyJohn HammondFAKE Zoom Taxes MALWARENahamSecMy Friend Made $40,000 Using Claude Code (Here's How)NetworkChuckLearn networking with REAL labs ๐Ÿ‘‰ Join the Summer of CCNABlack HatSecTor 2025 | Quantifying Cyber Risk as a National Defense Imperative

By Source

Feeds organized so you can skim by site.

Density Sort
DB
David Bombal
22h ago ยท 15 items
15 loaded
JH
John Hammond
2d ago ยท 15 items
15 loaded
TC
The Cyber Mentor
2d ago ยท 15 items
15 loaded
HA
Hak5
3d ago ยท 15 items
15 loaded
BH
Black Hat
4d ago ยท 15 items
15 loaded
PN
Proofpoint News Feed
5d ago ยท 10 items
DE
DEFCONConference
5d ago ยท 15 items
15 loaded
NA
NahamSec
6d ago ยท 15 items
15 loaded
NE
NetworkChuck
6d ago ยท 15 items
15 loaded
IP
IppSec
8d ago ยท 15 items
15 loaded
LI
LiveOverflow
60d ago ยท 15 items
15 loaded
SK
STร–K
253d ago ยท 15 items
15 loaded
HA
HackerSploit
389d ago ยท 15 items
15 loaded

No matching sources found.