Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2022.10.13.md
What can we learn from leaked Insyde's BIOS for Intel Alder Lake - https://hardenedvault.net/blog/2022-10-08-alderlake_fw-leak/
Taming Transformers for High-Resolution Image Synthesis - https://github.com/CompVis/taming-transformers
Attacking Encrypted HTTP Communications https://www.pentestpartners.com/security-blog/attacking-encrypted-http-communications/
A Deep Dive Into the APT28’s stealer called CredoMap - https://securityscorecard.com/research/apt28s-stealer-called-credomap
Another Tale of IBM i (AS/400) Hacking - https://blog.silentsignal.eu/2022/09/28/another-tale-of-ibm-i-as-400-hacking/
What can we learn from leaked Insyde's BIOS for Intel Alder Lake - https://hardenedvault.net/blog/2022-10-08-alderlake_fw-leak/
Taming Transformers for High-Resolution Image Synthesis - https://github.com/CompVis/taming-transformers
Attacking Encrypted HTTP Communications https://www.pentestpartners.com/security-blog/attacking-encrypted-http-communications/
A Deep Dive Into the APT28’s stealer called CredoMap - https://securityscorecard.com/research/apt28s-stealer-called-credomap
Another Tale of IBM i (AS/400) Hacking - https://blog.silentsignal.eu/2022/09/28/another-tale-of-ibm-i-as-400-hacking/
Zaloguj się aby komentować