Beginner’s guide to malware analysis and reverse engineering
intezer.com·3d
🔗Binary Similarity
How we trained an ML model to detect DLL hijacking
securelist.com·57m
🔗Binary Similarity
Automated Verification of Code Logic & Security Vulnerabilities via Hyperdimensional Semantic Analysis
dev.to·4h·
Discuss: DEV
📏Code Metrics
Reading the ENISA Threat Landscape 2025 report
securityaffairs.com·2h
🎯Threat Hunting
LLM-Generated Samples for Android Malware Detection
arxiv.org·4h
💻Local LLMs
Detecting DLL hijacking with machine learning: real-world cases
securelist.com·57m
🎫Kerberos Exploitation
Hunting SharpHounds with Spectra Analyze
reversinglabs.com·3d
🔗Binary Similarity
At&Df: Side-Channel Data Encoding Through Virtual MouseMvm(CursorHoppingEncoder)
zenodo.org·4d·
Discuss: Hacker News
🌐DNS Security
Malvertising Campaign Hides in Plain Sight on WordPress Websites
blog.sucuri.net·2d
📡Feed Security
Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug
news.risky.biz·8h
🔓Hacking
TryHackMe Infinity Shell Walkthrough: Web Shell Forensics & CTF Guide
infosecwriteups.com·1d
📟Terminal Forensics
Using Information Entropy To Make Choices / Choose Experiments
blog.demofox.org·5h
🔲Cellular Automata
Are Software Registries Inherently Insecure?
developers.slashdot.org·7h
📦Container Security
From threats to apology, hackers pull child data offline after public backlash
malwarebytes.com·2d
🏴‍☠️Piracy
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·4h
🔐Capability Systems
Adventures on the AI Coding side of things
medium.com·48m·
Discuss: Hacker News
🌍Cultural Algorithms
Google Chrome RCE (No Sandbox) via CanonicalEquality:EqualValueType()
ssd-disclosure.com·13h·
Discuss: Hacker News
🛡️WASM Security
Spot trouble early with honeypots and Suricata
pentestpartners.com·3d
🛡️eBPF Security
Automatic Building Code Review: A Case Study
arxiv.org·4h
📏Code Metrics
Mic-E-Mouse, Covert Eavesdropping Through Computer Mice
sites.google.com·1d·
📼Cassette Hacking