Все публикации

Secret Web Hacking Knowledge: CTF Authors Hate These Simple Tricks - Philippe Dourassov

Abusing Misconfigured OIDC Authentication In Cloud Environments - Christophe Tafani-Dereeper

Beating The Sanitizer: Why You Should Add MXSS To Your Toolbox - Paul Gerste & Yaniv Nizry

FuzzyAI: Attacking LLMs With Coverage-Guided Fuzzing - Eran Shimony & Mark Cherp

Current Affairs: IoT Security 101 - Iana Peix

Smart Toy Vulnerabilities Can Put Your Child At Risk Of Abuse By Strangers - Nikolay Frolov

Hijacking The Java Virtual Machine And Bypassing Runtime Application Self-Protection - Mouad Kondah

Meet The Latest Innovations And Startups In Cybersecurity And How To Become A Cyber Entrepreneur?

Patch Different On *OS - John McIntosh

Your NVMe Had Been Syz'ed - Alon Zahavi

MFT: Malicious Fungible Tokens - Mauro Eldritch

Diving Into JumpServer: The Public Key Unlocking Your Whole Network - Oskar Zeino-Mahmalat

Living Off The Land And Attacking Operational Technology With Surgical Precision - Ric Derbyshire

Threats And Mitigations Landscape In The Age Of Generative AI - Andrei Kucharavy

Operation Triangulation: Attacks On IPhones/iPads - Marco Preuss

How (Not) To Implement Secure Digital Identity:A Study Of Poland's Digital ID System - Szymon Chadam

The Accessibility Abyss: Navigating Android Malware Waters - Axelle Apvrille

ADDS Persistance - Burn It, Burn It All - Charlie 'Shutdown' Bromberg & Volker

When Malware Becomes Creative: A Survey Of Android Detection Evasion Tactics - Dimitrios Valsamaras

Enhancing AWS Security: A Holistic Approach To Organization Management - Bogdan Nicorici

Uncommon Process Injection Pattern - Yoann Dequeker

Standing On The Shoulders Of Giant(Dog)s: A Kubernetes Attack Graph Model - Julien Terriac

Pentesting By The Numbers: What Data Analysis Tells About What We Do by Charl Van Der Walt

Go Security Pitfalls: 2 Lessons From The Battlefield At Grafana Labs by Jeremy Matos