Aggregator
Weak Randomness Part I – Linear Congruential Random Number Generators
4 months 3 weeks ago
WastedLocker: A New Ransomware Variant Developed By The Evil Corp Group
4 months 3 weeks ago
Vulnerability Overview: Ghost (CVE-2015-0235)
4 months 3 weeks ago
Vulnerabilities Found In Geofencing Apps
4 months 3 weeks ago
VoIP Security Methodology and Results
4 months 3 weeks ago
vlan-hopping
4 months 3 weeks ago
Virtual Access Monitor Multiple SQL Injection Vulnerabilities
4 months 3 weeks ago
Visualising Firewall Rulesets – Simplifying Firewall Administration and Spotting the Pivot Point
4 months 3 weeks ago
Vehicle Emissions and Cyber Security
4 months 3 weeks ago
Violating Database – Enforced Security Mechanisms
4 months 3 weeks ago
Violating the Virtual Channel – RDP Testing
4 months 3 weeks ago
Variations in Exploit methods between Linux and Windows
4 months 3 weeks ago
Using SharePoint as a Phishing Platform
4 months 3 weeks ago
Vaccine Misinformation Part 1: Misinformation Attacks as a Cyber Kill Chain
4 months 3 weeks ago
Using AWS and Azure for Cost Effective Log Ingestion with Data Processing Pipelines for SIEMs
4 months 3 weeks ago
Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things
4 months 3 weeks ago
Using Semgrep with Jupyter Notebook files
4 months 3 weeks ago
Use of Deserialisation in .NET Framework Methods and Classes
4 months 3 weeks ago
Username enumeration techniques and their value
4 months 3 weeks ago