Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2023.05.10.md
Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys - https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys
Reverse Engineering Architecture And Pinout of Custom Asics - https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/
Migrating Critical Traffic At Scale with No Downtime — Part 1 - https://netflixtechblog.com/migrating-critical-traffic-at-scale-with-no-downtime-part-1-ba1c7a1c7835
Malicious Actors Use Unicode Support in Python to Evade Detection - https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
Google Cloud Platform Exfiltration: A Threat Hunting Guide - https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide
#informatyka
Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys - https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys
Reverse Engineering Architecture And Pinout of Custom Asics - https://sec-consult.com/blog/detail/reverse-engineering-architecture-pinout-plc/
Migrating Critical Traffic At Scale with No Downtime — Part 1 - https://netflixtechblog.com/migrating-critical-traffic-at-scale-with-no-downtime-part-1-ba1c7a1c7835
Malicious Actors Use Unicode Support in Python to Evade Detection - https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection
Google Cloud Platform Exfiltration: A Threat Hunting Guide - https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide
#informatyka
Zaloguj się aby komentować