At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·13h·
Discuss: Hacker News
🦠Malware Analysis
The Making of a Minimalist Analog Drum Machine
hackaday.com·14h
🧪Cassette Hacks
Adaptive Diffusive Quantization for Enhanced Image Reconstruction Fidelity
dev.to·9h·
Discuss: DEV
🖼️JPEG XL
When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·5h·
Discuss: Hacker News
🔗Data Provenance
Spot trouble early with honeypots and Suricata
pentestpartners.com·10h
🛡️eBPF Security
Revisiting bsdiff as a tool for digital preservation
exponentialdecay.co.uk·3d
💿FLAC Archaeology
Quantum key distribution method tested in urban infrastructure offers secure communications
phys.org·1h
🔐Quantum Security
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·4h
🦠Malware Analysis
Foreground vs. Background: Analyzing Typographic Attack Placement in Autonomous Driving Systems
hackernoon.com·1d
🔍Character Forensics
Release of ERNW White Paper 73: Analyzing WinpMem Driver Vulnerabilities
insinuator.net·7h
🧠Memory Forensics
PIPER Robotic Arm - Fixed Position Recording & Replay
hackster.io·2d
🤖Tape Automation
I/Q Data for Dummies
whiteboard.ping.se·15h·
Discuss: Hacker News
📊Frequency Analysis
A $50 'Battering RAM' Can Bust Confidential Computing
darkreading.com·1d
🔓Hacking
Insecure Mobile VPNs: The Hidden Danger
zimperium.com·6h
🌐DNS Security
Signal Protocol and Post-Quantum Ratchets
signal.org·19h·
🔐Quantum Security
TOTOLINK X6000R: Three New Vulnerabilities Uncovered
unit42.paloaltonetworks.com·1d
🛡️eBPF Security
Your Smart Home is Betraying You: How to Secure IoT Devices (Cameras, Speakers, Kettles)
forums.anandtech.com·1d
🏠Home Automation
This is serious, I am not kidding
aardvark.co.nz·1d
Proof Automation
What Did the Attacker Read? MailItemAccessed Tells You
blog.nviso.eu·12h
🔍NTLM Forensics
WireTap: Breaking Server SGX via DRAM Bus Interposition
wiretap.fail·1d·
Discuss: Hacker News
🛡️RISC-V Security