1KeyTrap: Serious Vulnerability in the Internet Infrastructure (opens in new tab)(athene-center.de)1pedro841y ago0
7Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (opens in new tab)(arxiv.org)1pedro845y ago0
8How to Store Session Tokens in a Browser (and the Impacts of Each) (opens in new tab)(blog.ropnop.com)4pedro845y ago1
9On modern hardware the min-max heap beats a binary heap (opens in new tab)(probablydance.com)244pedro845y ago43
10The Octopus Scanner Malware: Attacking the open source supply chain (opens in new tab)(securitylab.github.com)2pedro845y ago0
11OpenSSH to deprecate SHA-1 logins due to security risk (opens in new tab)(zdnet.com)1pedro845y ago1
14Setting the Record Straight on OSS vs. Perens: Implications on Stewards of GPL (opens in new tab)(grsecurity.net)2pedro846y ago0