011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure
securityaffairs.com·9h
🛡Cybersecurity
Flag this post
IFS Fractal codec
codecs.multimedia.cx·8h
🌀Fractal Compression
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.org·16h
🔒Language-based security
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·1d
📦Container Security
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
Oops, My UUIDs Collided
🧪Binary Fuzzing
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
OpenSMTPD 7.8.0p0
bsdsec.net·9h
🐡OpenBSD
Flag this post
How unstructured data turns your business into a junk drawer - and how to fix it
techradar.com·4h
📄Document Digitization
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·2d
🦠Malware Analysis
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
EY 4TB Data Leak
🔓Hacking
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.com·22h
🌳Archive Merkle Trees
Flag this post
Loading...Loading more...