|
You are here |
comsecuris.com | ||
| | | | |
santandersecurityresearch.github.io
|
|
| | | | | The public blog of Santander Cyber Security Research | |
| | | | |
insinuator.net
|
|
| | | | | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ... | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs. | |
| | | | |
openpunk.com
|
|
| | | So recently I've been getting back into Lua, my first scripting language. I've already done a series about manipulating the LuaVM, (which you can read here) but this time I was interested in the LuaVM bytecode, specifically the Lua 5.1 bytecode. If you don't know what bytecode is or even how Lua works, here's a basic rundown: LuaC is the Lua Compiler. Its job is to turn our human readable script into Lua Bytecode ready to be executed by the LVM (LuaVM) This bytecode is everything the LVM needs to run! | ||