|
You are here |
xakcop.com | ||
| | | | |
securehoney.net
|
|
| | | | | In this week's blog post I describe how I dissected an Android ransomware virus called Simplelocker. | |
| | | | |
haxrob.net
|
|
| | | | | Discovery and analysis of a magic packet type implant that communicates C2 traffic over the GTP-C 3GPP protocol. | |
| | | | |
yepoleb.github.io
|
|
| | | | | [AI summary] The author details the process of reverse engineering the Austrian CHECK-AT app to extract its web API and encryption keys for open-source implementation. | |
| | | | |
www.scottbrady.io
|
|
| | | JWTs get a lot of hate from the crypto community, but what are the alternatives? In this article, I look at implementations such as Branca and PASETO to see how they compare to JWTs. | ||