MSAB Whitepaper – Investigating RAM In A Mobile Device
forensicfocus.com·3h
🔬Hardware Forensics
Flag this post
Let's Poison Your LLM Application: A Security Wake-Up Call
dev.to·59m·
Discuss: DEV
🧪Binary Fuzzing
Flag this post
LPE via refcount imbalance in the af_Unix of Ubuntu's Kernel
ssd-disclosure.com·1d·
Discuss: Hacker News
🏺ZIP Archaeology
Flag this post
From Bottleneck to Breakthrough: AI in Chip Verification
spectrum.ieee.org·7h
🔧Hardware Verification
Flag this post
From Scripts to Systems: A Comprehensive Look at Tangerine Turkey Operations
cybereason.com·1d
🦠Malware Analysis
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·1d
🦠Malware Analysis
Flag this post
New Windows 11 feature aims to diagnose crashes — will check RAM after BSODs to look for problems
tomshardware.com·1d·
Discuss: r/Windows11
💾Persistent Memory
Flag this post
Making RAM for a TMS9900 Homebrew Computer
hackaday.com·12h
Homebrew CPUs
Flag this post
What Security Teams Need to Know as PHP and IoT Exploits Surge
blog.qualys.com·4h
📦Container Security
Flag this post
What to do when you have a crash in the runtime control flow guard check
devblogs.microsoft.com·1d
🧪RISC-V Fuzzing
Flag this post
Learning osquery
blog.devops.dev·3d
🔌Operating system internals
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
danglingpointers.substack.com·1h·
Discuss: Substack
Hardware Transactional Memory
Flag this post
Relevant — TryHackMe Room Walkthrough
infosecwriteups.com·8h
🎯NTLM Attacks
Flag this post
I accidentally created digital life. Now I need to figure out how to tune it.
youtube.com·12h·
Discuss: r/homelab
📲syncthing
Flag this post
Hacking the Color BASIC PRINT command – part 6
subethasoftware.com·23h
📺VT100
Flag this post
EY reportedly leaked a massive 4TB database online - exposing company secrets online for all to see
techradar.com·5h
🗃️Database Forensics
Flag this post
REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·3h
🕵️Steganographic Archives
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·6h
🦠Parasitic Storage
Flag this post
1130MRAM smoking gun found
rescue1130.blogspot.com·1d·
Circuit Archaeology
Flag this post
Finding Order in the Mayhem: A Novel Concurrency Testing Tool that Improved the Kotlin Compiler
blog.jetbrains.com·1d·
Discuss: Hacker News
Effect Handlers
Flag this post