Aggregator
Threat Modelling Cloud Platform Services by Example: Google Cloud Storage
7 months 3 weeks ago
Threat Profiling Microsoft SQL Server
7 months 3 weeks ago
Third party assurance
7 months 3 weeks ago
Threat Actors: exploiting the pandemic
7 months 3 weeks ago
There’s Another Hole In Your SoC: Unisoc ROM Vulnerabilities
7 months 3 weeks ago
They Ought to Know Better: Exploiting Security Gateways via their Web Interfaces
7 months 3 weeks ago
Thin Clients: Slim Security
7 months 3 weeks ago
The why behind web application penetration test prerequisites
7 months 3 weeks ago
There’s A Hole In Your SoC: Glitching The MediaTek BootROM
7 months 3 weeks ago
The SSL Conservatory
7 months 3 weeks ago
The Update Framework (TUF) Security Assessment
7 months 3 weeks ago
The Sorry State of Aftermarket Head Unit Security
7 months 3 weeks ago
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
7 months 3 weeks ago
The role of security research in improving cyber security
7 months 3 weeks ago
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes, 2nd Edition
7 months 3 weeks ago
The Pentesters Guide to Akamai
7 months 3 weeks ago
The Pharming Guide – Understanding and preventing DNS related attacks by phishers
7 months 3 weeks ago
The Phishing Guide: Understanding & Preventing Phishing Attacks
7 months 3 weeks ago
The Paillier Cryptosystem with Applications to Threshold ECDSA
7 months 3 weeks ago