011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Hash Functions
Flag this post
Oops, My UUIDs Collided
๐งชBinary Fuzzing
Flag this post
Automated Semantic Validation of Modular Software Architectures via Hyper-Graph Resonance
๐Reproducible Builds
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐ก๏ธeBPF Security
Flag this post
Attackers dig up $11M in Garden Finance crypto exploit
theregister.comยท6h
๐ณArchive Merkle Trees
Flag this post
Policy, privacy and post-quantum: anonymous credentials for everyone
blog.cloudflare.comยท1d
๐Quantum Security
Flag this post
North Korean hackers seen using blockchain to hide crypto-stealing malware
๐Blockchain Archives
Flag this post
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks
securityaffairs.comยท1h
๐Hacking
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.comยท1d
๐ฆ Parasitic Storage
Flag this post
Roni Carta: From Bug Bounties to Building a Safer Supply Chain
hackerone.comยท23h
๐Hacking
Flag this post
Technology Short Take 189
blog.scottlowe.orgยท7h
๐ Homelab Archaeology
Flag this post
EthVault: A Secure and Resource-Conscious FPGA-Based Ethereum Cold Wallet
arxiv.orgยท2d
๐Stream Ciphers
Flag this post
Evolving Product Security: Scaling YARA Detections with the Binarly Transparency Platform v3.5
binarly.ioยท1d
๐CBOR
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.comยท20h
๐Decompilation
Flag this post
From Brazil with Love: New Tactics from Lampion
bitsight.comยท22h
๐ณArchive Merkle Trees
Flag this post
Notes from RIPE 91
blog.apnic.netยท21h
๐DNS over QUIC
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.comยท1d
๐Binary Similarity
Flag this post
Vulnerability Analysis: Deconstructing the $147k Sharwa Finance Exploit
blog.verichains.ioยท1d
๐ซKerberos Attacks
Flag this post
Loading...Loading more...