Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2026.04.22.md
How I Reverse Engineered a Rust Botnet and Built a C2 Honeypot to Monitor Its Targets - https://beelzebub.ai/blog/rust-ddos-botnet-honeypot-c2-decoding/
When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 - https://amlalabs.com/blog/oauth-cve-2025-6514/
Replaced by a Goldfish - https://clawd.it/posts/10-replaced-by-a-goldfish/
(CVE-2025-47985) Windows Event Tracing Insufficient Validation Leading to Elevation of Privilege - https://starlabs.sg/advisories/25/25-47985/
AWS Penetration Testing Guide: Techniques & Methodology - https://deepstrike.io/blog/aws-penetration-testing-guide-techniques-and-methodology
#informatyka