|
You are here |
yifan.lu | ||
| | | | |
labs.withsecure.com
|
|
| | | | | Full disk encryption is one of the cornerstones of modern endpoint protection. It is not only an effective method to protect sensitive data against physical theft, but it also protects data integrity against tampering attacks. | |
| | | | |
blog.quarkslab.com
|
|
| | | | | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip. | |
| | | | |
www.copetti.org
|
|
| | | | | An in-depth analysis that explains how this console works internally | |
| | | | |
intezer.com
|
|
| | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | ||