Side Channels, Covert Communication, Security Analysis, Data Exfiltration
Surveillance is inequality’s stabilizer
doctorow.medium.com·5h
ICSA Colloquium Talk - 10/07/2025
informatics.ed.ac.uk·1d
Maturing your smart contracts beyond private key risk
blog.trailofbits.com·2d
Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks
blog.checkpoint.com·10h
What is smishing?
proton.me·3h
All you wanted to know about sw vulnerabilities…but were too busy to look into - DevConf.CZ 2025
youtube.com·14h
Passwordless Auth: a JSON-Based Approach for modern authentication w/ SSSD & GNOME - DevConf.CZ 2025
youtube.com·14h
VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels
arxiv.org·2d
Probe before You Talk: Towards Black-box Defense against Backdoor Unalignment for Large Language Models
arxiv.org·3d
U.S. CISA adds AMI MegaRAC SPx, D-Link DIR-859 routers, and Fortinet FortiOS flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·14h
What’s the Difference Between Ethical Hacking and Cybersecurity Operations?
securityscorecard.com·1d
Loading...Loading more...