Aggregator
Managing Cyber Risk in the Supply Chain
1 year 4 months ago
Managing PowerShell in a modern corporate environment
1 year 4 months ago
Manifest Explorer
1 year 4 months ago
Mallory and Me: Setting up a Mobile Mallory Gateway
1 year 4 months ago
Mallory: Transparent TCP and UDP Proxy
1 year 4 months ago
Man-in-the-Middling Non-Proxy Aware Wi-Fi Devices with a Pineapple
1 year 4 months ago
Machine learning from idea to reality: a PowerShell case study
1 year 4 months ago
Making New Connections – Leveraging Cisco AnyConnect Client to Drop and Run Payloads
1 year 4 months ago
Machine Learning 104: Breaking AES With Power Side-Channels
1 year 4 months ago
Machine Learning for Static Analysis of Malware – Expansion of Research Scope
1 year 4 months ago
Machine Learning 103: Exploring LLM Code Generation
1 year 4 months ago
Lumension Device Control Remote Memory Corruption
1 year 4 months ago
Machine Learning 101: The Integrity of Image (Mis)Classification?
1 year 4 months ago
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
1 year 4 months ago
LTair: The LTE Air Interface Tool
1 year 4 months ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
1 year 4 months ago
Login Service Security
1 year 4 months ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
1 year 4 months ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
1 year 4 months ago