Aggregator
Machine Learning 102: Attacking Facial Authentication with Poisoned Data
6 months 3 weeks ago
LTair: The LTE Air Interface Tool
6 months 3 weeks ago
Lumension Device Control (formerly Sanctuary) remote memory corruption
6 months 3 weeks ago
Login Service Security
6 months 3 weeks ago
Logs, Logs, the Audit Trail – Features of a Successful Log Management Solution
6 months 3 weeks ago
Low Cost Attacks on Smart Cards – The Electromagnetic Side-Channel
6 months 3 weeks ago
Log4Shell: Reconnaissance and post exploitation network detection
6 months 3 weeks ago
Live Incident Blog: June Global Ransomware Outbreak
6 months 3 weeks ago
Local network compromise despite good patching
6 months 3 weeks ago
log4j-jndi-be-gone: A simple mitigation for CVE-2021-44228
6 months 3 weeks ago
libtalloc: A GDB plugin for analysing the talloc heap
6 months 3 weeks ago
Lights, Camera, HACKED! An insight into the world of popular IP Cameras
6 months 3 weeks ago
Lessons learned from 50 USB bugs
6 months 3 weeks ago
LibAVCodec AMV Out of Array Write
6 months 3 weeks ago
Lessons learned from 50 bugs: Common USB driver vulnerabilities
6 months 3 weeks ago
Lending a hand to the community – Covenant v0.7 Updates
6 months 3 weeks ago
LDAPFragger: Bypassing network restrictions using LDAP attributes
6 months 3 weeks ago
LeaPFRogging PFR Implementations
6 months 3 weeks ago
LAPSUS$: Recent techniques, tactics and procedures
6 months 3 weeks ago