Aggregator
On the Use of Pedersen Commitments for Confidential Payments
9 months 1 week ago
Online Casino Roulette – A guideline for penetration testers and security researchers
9 months 1 week ago
On Linux’s Random Number Generation
9 months 1 week ago
On Multiplications with Unsaturated Limbs
9 months 1 week ago
On the malicious use of large language models like GPT-3
9 months 1 week ago
NX Server for Linux Arbitrary Files can be read with root privileges
9 months 1 week ago
OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
9 months 1 week ago
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP
9 months 1 week ago
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering
9 months 1 week ago
NSA & CISA Kubernetes Security Guidance – A Critical Review
9 months 1 week ago
Non-Deterministic Nature of Prompt Injection
9 months 1 week ago
Non-flood/non-volumetric Distributed Denial of Service (DDoS)
9 months 1 week ago
Non Obvious PE Parsers – The .NET runtime – Part 1
9 months 1 week ago
Nine years of bugs at NCC Group
9 months 1 week ago
NIST Selects Post-Quantum Algorithms for Standardization
9 months 1 week ago
New Attack Vectors and a Vulnerability Dissection of MS03-007
9 months 1 week ago
New Sources of Microsoft Office Metadata – Tool Release MetadataPlus
9 months 1 week ago
NETGEAR Routers: A Playground for Hackers?
9 months 1 week ago
Network Attached Security: Attacking a Synology NAS
9 months 1 week ago