Using bidirectionality override characters to obscure code. [Research Saturday]

Using bidirectionality override characters to...

Up next

Christian Lees: It's not always textbook. [CTO] [Career Notes]

Please enjoy this encore of Career Notes. Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a fa ...  Show more

Your AI sidekick might be a spy. [Research Saturday]

This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posin ...  Show more

Recommended Episodes

Episode 10: Exploiting Authenticated Encryption Key Commitment!
Cryptography FM

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...  Show more

Terrifying Trojans
Command Line Heroes

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace ...  Show more

Episode 2: Breaking Lightweight Symmetric Cryptography!
Cryptography FM

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash func ...  Show more

Episode 54: White Box Formulas - Vulnerable Coding Patterns
Critical Thinking - Bug Bounty Podcast

Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a ...  Show more