unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
The Paillier Cryptosystem with Applications to Threshold ECDSA
You may have heard of RSA (b. 1977), but have you heard of its cousin, Pail...
2023-5-19 22:41:55 | 阅读: 20 |
收藏
|
NCC Group Research - research.nccgroup.com
paillier
encryption
modulo
ecdsa
ciphertext
Rigging the Vote: Uniqueness in Verifiable Random Functions
This blog post presents a whirlwind overview of Verifiable Random Funct...
2023-5-18 19:0:0 | 阅读: 23 |
收藏
|
NCC Group Research - research.nccgroup.com
gamma
vrf
calculate
voting
committee
Medical Devices: A Hardware Security Perspective
Medical device security is gaining more attention for several reasons. The c...
2023-5-18 01:48:47 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
security
patient
software
threats
development
NETGEAR Routers: A Playground for Hackers?
SummaryAdvisoriesVulnerabilitiesTelnetPSV-2023-0008– Telnet Default...
2023-5-15 17:13:36 | 阅读: 37 |
收藏
|
NCC Group Research - research.nccgroup.com
payload
netgear
2048
overflow
soapaction
Real World Cryptography Conference 2023 – Part I
The annual Real World Cryptography Conference organized by the IACR recentl...
2023-5-11 04:36:53 | 阅读: 24 |
收藏
|
NCC Group Research - research.nccgroup.com
encryption
commitment
security
ciphertext
pqc
Public Report – AWS Nitro System API & Security Claims
In the last calendar quarter of 2022, Amazon Web Services (AWS) engaged NCC...
2023-5-4 07:28:33 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
rebinding
llm
pwn2own
machine
nitro
State of DNS Rebinding in 2023
Different forms of DNS rebinding attacks have been described as far back as...
2023-4-27 09:1:0 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
network
rebinding
chrome
singularity
bypass
Machine Learning 103: Exploring LLM Code Generation
This executable blog post is the third in a series related to machine l...
2023-4-25 09:1:0 | 阅读: 19 |
收藏
|
NCC Group Research - research.nccgroup.com
security
solana
kubernetes
zk
pwn2own
HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own
Alex Plaskett and McCaulay Hudson presented this talk at HITB AMS on the 20t...
2023-4-24 16:31:1 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
security
netgear
synology
chains
Public Report – AWS Nitro System API & Security Claims
In the last calendar quarter of 2022, Amazon Web Services (AWS) engaged NCC...
2023-4-20 14:0:0 | 阅读: 45 |
收藏
|
NCC Group Research - research.nccgroup.com
security
cloud
kubernetes
solana
nitro
Public Report – Kubernetes 1.24 Security Audit
NCC Group was selected to perform a security evaluation of Kubernetes 1.24....
2023-4-17 13:1:13 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
security
kubernetes
solana
pedersen
Public Report – Solana Program Library ZK-Token Security Assessment
In August 2022, Solana Foundation engaged NCC Group to conduct a security as...
2023-4-14 00:0:16 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
security
kubernetes
amounts
Stepping Insyde System Management Mode
In October of 2022, Intel’s Alder Lake BIOS source code was leaked online....
2023-4-11 21:5:38 | 阅读: 23 |
收藏
|
NCC Group Research - research.nccgroup.com
smm
smi
smram
efi
memory
Hardware & Embedded Systems: A little early effort in security can return a huge payoff
Editor’s note: This piece was originally published by embedded.com...
2023-4-5 23:40:33 | 阅读: 19 |
收藏
|
NCC Group Research - research.nccgroup.com
security
development
firmware
hardware
software
Public Report – O(1) Labs Mina Client SDK, Signature Library and Base Components Cryptography and Implementation Review
During October 2021, O(1) Labs engaged NCC Group’s Cryptography Services te...
2023-4-5 23:40:32 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
security
lexmark
cirt
karakurt
exploited
Analyzing a PJL directory traversal vulnerability – exploiting the Lexmark MC3224i printer (part 2)
SummaryYou said "Reverse Engineering"?Vulnerability detailsBackgroundReaching the...
2023-4-5 23:40:32 | 阅读: 51 |
收藏
|
NCC Group Research - research.nccgroup.com
pjl
0x400
getc
lexmark
Detecting Karakurt – an extortion focused threat actor
This research was conducted by Simon Biggs, Richard Footman and Michael Mul...
2023-4-5 23:40:31 | 阅读: 20 |
收藏
|
NCC Group Research - research.nccgroup.com
karakurt
victim
utilised
strongly
Bypassing software update package encryption – extracting the Lexmark MC3224i printer firmware (part 1)
Here are some related articles you may find interesting...
2023-4-5 23:40:30 | 阅读: 27 |
收藏
|
NCC Group Research - research.nccgroup.com
mina
exploited
security
lexmark
seeking
Shaking The Foundation of An Online Collaboration Tool: Microsoft 365 Top 5 Attacks vs the CIS Microsoft 365 Foundation Benchmark
As one of the proud contributors to the Center for Internet Security (CIS)...
2023-4-5 23:40:30 | 阅读: 16 |
收藏
|
NCC Group Research - research.nccgroup.com
microsoft
phishing
security
defender
spamming
BAT: a Fast and Small Key Encapsulation Mechanism
In this post we present a newly published key encapsulation mechanism (KEM)...
2023-4-5 23:40:29 | 阅读: 17 |
收藏
|
NCC Group Research - research.nccgroup.com
kem
lattice
Previous
5
6
7
8
9
10
11
12
Next