Using bidirectionality override characters to obscure code. [Research Saturday]

Using bidirectionality override characters to...

Up next

“The hackers made me do it,” or did they?

Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman-for-hire site. A UK court ...  Show more

How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]

Please enjoy this encore of CISO Perspectives. We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: While the cybersecurity industry has expanded and grow ...  Show more

Recommended Episodes

Episode 10: Exploiting Authenticated Encryption Key Commitment!
Cryptography FM

Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ...  Show more

Terrifying Trojans
Command Line Heroes

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace ...  Show more

Episode 2: Breaking Lightweight Symmetric Cryptography!
Cryptography FM

Aside from working on a competition for standardizing post-quantum primitives, the United States National Institute of Standards and Technology, or NIST, has also organized a lightweight cryptography competition meant to attract designs for symmetric primitives, such as hash func ...  Show more

Episode 54: White Box Formulas - Vulnerable Coding Patterns
Critical Thinking - Bug Bounty Podcast

Episode 54: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joel are back with news items and new projects. Joel shares about his personal scraping project to gather data on bug bounty programs and distribution Next, they announce the launch of HackerNotes, a ...  Show more