Using bidirectionality override characters to obscure code. [Research Saturday]

Using bidirectionality override characters to...

Suivant

Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]

Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both h ...  Afficher plus

The lies that let AI run amok. [Research Saturday]

Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving use ...  Afficher plus

Épisodes Recommandés

Episode 10: Exploiting Authenticated Encryption Key Commitment!
Cryptography FM

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...  Afficher plus

Terrifying Trojans
Command Line Heroes

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace ...  Afficher plus

Episode 2: Breaking Lightweight Symmetric Cryptography!
Cryptography FM

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash func ...  Afficher plus

Episode 54: White Box Formulas - Vulnerable Coding Patterns
Critical Thinking - Bug Bounty Podcast

Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a ...  Afficher plus