| 1. | | KeyTrap: Serious Vulnerability in the Internet Infrastructure (athene-center.de) |
| 1 point by pedro84 on June 11, 2024 | past |
|
| 2. | | How to securely build product features using AI APIs (tldrsec.com) |
| 2 points by pedro84 on July 11, 2023 | past |
|
| 3. | | A new way to parse plain text tables (kellybrazil.com) |
| 3 points by pedro84 on March 28, 2022 | past |
|
| 4. | | The Collapse of Putin’s Disinformation Machinery (wired.com) |
| 8 points by pedro84 on March 10, 2022 | past |
|
| 5. | | VMSA-2021-0010: What You Need to Know (vmware.com) |
| 2 points by pedro84 on May 25, 2021 | past |
|
| 6. | | Unauthorized RCE in VMware VCenter (ptsecurity.com) |
| 13 points by pedro84 on Feb 24, 2021 | past | 1 comment |
|
| 7. | | Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (arxiv.org) |
| 1 point by pedro84 on Dec 16, 2020 | past |
|
| 8. | | How to Store Session Tokens in a Browser (and the Impacts of Each) (ropnop.com) |
| 4 points by pedro84 on Oct 6, 2020 | past | 1 comment |
|
| 9. | | On modern hardware the min-max heap beats a binary heap (probablydance.com) |
| 244 points by pedro84 on Sept 2, 2020 | past | 43 comments |
|
| 10. | | The Octopus Scanner Malware: Attacking the open source supply chain (securitylab.github.com) |
| 2 points by pedro84 on May 29, 2020 | past |
|
| 11. | | OpenSSH to deprecate SHA-1 logins due to security risk (zdnet.com) |
| 1 point by pedro84 on May 27, 2020 | past | 1 comment |
|
| 12. | | Decentralized Privacy-Preserving Proximity Tracing (github.com/dp-3t) |
| 3 points by pedro84 on April 9, 2020 | past |
|
| 13. | | Playing on Kansas City Radio: Russian Propaganda (nytimes.com) |
| 4 points by pedro84 on Feb 14, 2020 | past |
|
| 14. | | Setting the Record Straight on OSS vs. Perens: Implications on Stewards of GPL (grsecurity.net) |
| 2 points by pedro84 on Feb 10, 2020 | past |
|
| 15. | | A Dead Simple VPN (github.com/jedisct1) |
| 7 points by pedro84 on July 17, 2019 | past | 4 comments |
|
| 16. | | Block Breakers – block cipher cryptanalysis (davidwong.fr) |
| 1 point by pedro84 on July 11, 2019 | past |
|
| 17. | | What is Benford’s Law and why is it important for data science? (towardsdatascience.com) |
| 2 points by pedro84 on July 3, 2019 | past |
|
| 18. | | The Return of the WIZard: RCE in Exim (CVE-2019-10149) (openwall.com) |
| 1 point by pedro84 on June 6, 2019 | past | 1 comment |
|
| 19. | | SAE Side-Channel Attacks (w1.fi) |
| 2 points by pedro84 on April 10, 2019 | past |
|
| 20. | | Hearing your touch: A new acoustic side channel on smartphones (arxiv.org) |
| 2 points by pedro84 on April 4, 2019 | past |
|
| 21. | | The Rule of 2 (googlesource.com) |
| 1 point by pedro84 on April 4, 2019 | past |
|
| 22. | | Thunderclap: Modern computers are vulnerable to malicious peripheral devices (thunderclap.io) |
| 2 points by pedro84 on Feb 27, 2019 | past |
|
| 23. | | The Missing Security Primer for Bare Metal Cloud Services (eclypsium.com) |
| 4 points by pedro84 on Feb 26, 2019 | past |
|
| 24. | | Master of Web Puppets: Abusing Web Browsers for Persistence [pdf] (ndss-symposium.org) |
| 3 points by pedro84 on Feb 25, 2019 | past |
|
| 25. | | Article 13: “badness” rate (twitter.com/alecmuffett) |
| 2 points by pedro84 on Feb 17, 2019 | past |
|
| 26. | | GZ-Sort: A utility for sorting big files (kmkeen.com) |
| 1 point by pedro84 on Feb 15, 2019 | past |
|
| 27. | | A monologue followed by some dialogue on pagination (bubblin.io) |
| 1 point by pedro84 on Feb 13, 2019 | past |
|
| 28. | | CVE-2019-5736: Escape from Docker and Kubernetes Containers to Root on Host (blog.dragonsector.pl) |
| 2 points by pedro84 on Feb 13, 2019 | past |
|
| 29. | | Privilege Escalation in Ubuntu Linux (dirty_sock Exploit) (shenaniganslabs.io) |
| 2 points by pedro84 on Feb 13, 2019 | past |
|
| 30. | | Reverse RDP Attack: Code Execution on RDP Clients (checkpoint.com) |
| 5 points by pedro84 on Feb 5, 2019 | past |
|
|
| More |