computer security, crazy vulnerabilities
Encrypting identifiers in practice
sjoerdlangkemper.nl·17h
The Good, the Bad and the Ugly in Cybersecurity – Week 25
sentinelone.com·5d
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·14h
This Week in Security: That Time I Caused a 9.5 CVE, iOS Spyware, and The Day the Internet Went Down
hackaday.com·5d
Your passwords have probably been stolen and sold on the dark web
newscientist.com·5d
RedirectionGuard: Mitigating unsafe junction traversal in Windows
msrc.microsoft.com·15h
XOR Marks the Flaw in SAP GUI
darkreading.com·9h
Unsupervised Learning NO. 486
newsletter.danielmiessler.com·2d
AI Evasion: The Next Frontier of Malware Techniques
blog.checkpoint.com·9h
Exposure Protocol: Information Disclosure in the Wild [Part 4]
infosecwriteups.com·14h
Loading...Loading more...