Papers HOME PAPERS(523) REPORTS(264) CONFERENCE(22) WHITEPAPERS(20) KNIHY(24) RFC popisy(9411) SLOVNÍČEK(9) Podpůrné materiály(16)
16.3.21
Exploitation and Sanitization of Hidden Data in PDF Files
Multiple
12.3.21
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
11.3.21
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
Practical Keystroke Timing Attacks in Sandboxed JavaScript
6.3.21
SPEAR PHISHING TARGETING ICS SUPPLY CHAIN – ANALYSIS
ICS
5.3.21
RANSOMWARE UNCOVERED 2020—2021
Ransomware
2.3.21
Embracing a Zero Trust Security Model
BigBrother
China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions
A Global Perspective of the SideWinder APT
APT
27.02.2021
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem
25.02.2021
Characterizing CNAME Cloaking-Based Tracking on the Web
Click and Bait: Vietnamese Human Rights Defenders Targeted with Spyware Attacks
LazyScripter: From Empire to double RAT
24.02.2021
Attacks bypassing the signature validation in PDF
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks
Shadow Attacks: Hiding and Replacing Content in Signed PDFs
20.02.2021
The EMV Standard: Break, Fix, Verify
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions∗
18.02.2021
The Modern Hacker's Outreach - Paper
17.02.2021
Encrypted Linux x86-64 Loadable Kernel Modules - Paper
Linux
16.02.2021
Firmware Analysis and Simulation - Paper
API Security Overview - Paper
15.02.2021
Mobile App Security Overview - Paper
14.02.2021
Exploit WordPress Plugin Vulnerabilities Using Static Source Code Analysis - Paper
PHP
13.02.2021
Secure Coding References - Paper
12.02.2021
HeartBleed Attack - Paper
11.02.2021
Object Prototype Pollution - Paper
10.02.2021
Parallels Remote Application Server (RAS) 18 IP Disclosure - Paper
Windows
09.02.2021
A Hands-On Introduction to Insecure Deserialization - Paper
Python
08.02.2021
Understanding and Exploiting Zerologon - Paper
07.02.2021
Practical PHP Security - Paper
06.02.2021
Wireshark for Noobs - Paper
05.02.2021
Ethical Hacking and Penetration Testing Guide - Paper (Turkish)
04.02.2021
A hands-on approach to Linux Privilege Escalation - Paper
03.02.2021
Practical Insight Into Injections - Paper
02.02.2021
Deep Insight into Social Engineering - Paper
01.02.2021
Who is targeted by email-based phishing and malware?
30.7.20
27.5.20
26.2.20
25.2.20