REVEAL: A large-scale comprehensive image dataset for steganalysis
sciencedirect.com·1d
🕵️Steganographic Archives
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.com·13h
🔐Hash Functions
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·10h·
Discuss: DEV
🔐Homomorphic Encryption
Flag this post
Tracking an evolving Discord-based RAT family
reversinglabs.com·2d
🦠Malware Analysis
Flag this post
Vulnerabilities in LUKS2 disk encryption for confidential VMs
blog.trailofbits.com·1d
🦠Parasitic Storage
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
The internet was made for privacy
doctorow.medium.com·3h
🧲Magnetic Philosophy
Flag this post
AI and the strengthening of records management approaches
thinkingrecords.co.uk·1d
📐Archive Calculus
Flag this post
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
isc.sans.edu·2d
📟Terminal Forensics
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
IFS Fractal codec
codecs.multimedia.cx·8h
🌀Fractal Compression
Flag this post
OpenBSD proposes BPF socket filtering to enhance daemon security
discoverbsd.com·11h
🛡️eBPF Security
Flag this post
MSAB Whitepaper – Investigating RAM In A Mobile Device
forensicfocus.com·1d
🧠Memory Forensics
Flag this post
How scammers use your data to create personalized tricks that work
malwarebytes.com·1d
🔗Binary Similarity
Flag this post
Stochastic computing
scottlocklin.wordpress.com·3h
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Flag this post
BRONZE BUTLER exploits Japanese asset management software vulnerability
news.sophos.com·1d
🌐DNS Security
Flag this post
exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More
blog.exploits.club·3h
🔓Hacking
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Privacy Risks of 1x Neo Robot
captaincompliance.com·1h·
Discuss: Hacker News
🏠Home Automation
Flag this post
Creating a "Two-Face" Rust binary on Linux
synacktiv.com·3d
🦠Parasitic Storage
Flag this post