all InfoSec news
Topic: batch
Mutable Batch Arguments and Applications
2 days, 14 hours ago |
www.iacr.org
Polar: Improving DevSecOps Observability
1 week, 5 days ago |
malware.news
Veracode announced platform innovations
2 weeks, 2 days ago |
ai-techpark.com
New in Veracode Fix: Additional Language Support and Batch Fix
3 weeks, 2 days ago |
www.veracode.com
BatBadBut Vulnerability Exposes Windows Systems To Attacks
3 weeks, 3 days ago |
securityboulevard.com
April’s Patch Tuesday Brings Record Number of Fixes
1 month, 1 week ago |
krebsonsecurity.com
AT&T data leaked: 73 million customers affected
1 month, 2 weeks ago |
www.helpnetsecurity.com
Reckle Trees: Updatable Merkle Batch Proofs with Applications
1 month, 2 weeks ago |
www.iacr.org
Towards Understanding Dual BN In Hybrid Adversarial Training
1 month, 2 weeks ago |
arxiv.org
Monthly Threat Actor Group Intelligence Report, December 2023 (JPN)
1 month, 2 weeks ago |
malware.news
TinyTurla-NG Backdoor Has Big Capabilities
1 month, 3 weeks ago |
malware.news
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
2 months, 2 weeks ago |
www.iacr.org
Tumblr and WordPress blogs will be exploited for AI model training
2 months, 2 weeks ago |
www.techspot.com
Manipulating hidden-Markov-model inferences by corrupting batch data
2 months, 3 weeks ago |
arxiv.org
Understanding Macros in Malware: Types, Capabilities, Case Study
2 months, 4 weeks ago |
malware.news
Buffer Overflow in Mixture of Experts
3 months, 1 week ago |
arxiv.org
Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks
3 months, 1 week ago |
arxiv.org
Treasury sanctions Iranian cyber officials tied to 2023 water system hacks
3 months, 2 weeks ago |
malware.news
Practical Batch Proofs of Exponentiation
3 months, 2 weeks ago |
www.iacr.org
ISC StormCast for Monday, January 29th, 2024
3 months, 2 weeks ago |
isc.sans.edu
A Batch File With Multiple Payloads, (Fri, Jan 26th)
3 months, 3 weeks ago |
malware.news
Can Cyber Risk Quantification be Automated?
3 months, 3 weeks ago |
securityboulevard.com
Ways to do a Share-Point Bulk File Transfer — Reactive and Batch Job
3 months, 3 weeks ago |
malware.news
Apache Hadoop, Flink subjected to attacks
4 months, 1 week ago |
malware.news
Apache Hadoop, Flink subjected to attacks
4 months, 1 week ago |
www.scmagazine.com
The Great OneNote Scramble of 2023
4 months, 1 week ago |
malware.news
Chosen Ciphertext Security via BARGs
4 months, 3 weeks ago |
www.iacr.org
Batch Arguments to NIZKs from One-Way Functions
4 months, 3 weeks ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Mutable Batch Arguments and Applications
2 days, 14 hours ago |
www.iacr.org
Polar: Improving DevSecOps Observability
1 week, 5 days ago |
malware.news
Veracode announced platform innovations
2 weeks, 2 days ago |
ai-techpark.com
New in Veracode Fix: Additional Language Support and Batch Fix
3 weeks, 2 days ago |
www.veracode.com
BatBadBut Vulnerability Exposes Windows Systems To Attacks
3 weeks, 3 days ago |
securityboulevard.com
April’s Patch Tuesday Brings Record Number of Fixes
1 month, 1 week ago |
krebsonsecurity.com
AT&T data leaked: 73 million customers affected
1 month, 2 weeks ago |
www.helpnetsecurity.com
Reckle Trees: Updatable Merkle Batch Proofs with Applications
1 month, 2 weeks ago |
www.iacr.org
Towards Understanding Dual BN In Hybrid Adversarial Training
1 month, 2 weeks ago |
arxiv.org
Monthly Threat Actor Group Intelligence Report, December 2023 (JPN)
1 month, 2 weeks ago |
malware.news
TinyTurla-NG Backdoor Has Big Capabilities
1 month, 3 weeks ago |
malware.news
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
2 months, 2 weeks ago |
www.iacr.org
Tumblr and WordPress blogs will be exploited for AI model training
2 months, 2 weeks ago |
www.techspot.com
Manipulating hidden-Markov-model inferences by corrupting batch data
2 months, 3 weeks ago |
arxiv.org
Understanding Macros in Malware: Types, Capabilities, Case Study
2 months, 4 weeks ago |
malware.news
Buffer Overflow in Mixture of Experts
3 months, 1 week ago |
arxiv.org
Towards Eliminating Hard Label Constraints in Gradient Inversion Attacks
3 months, 1 week ago |
arxiv.org
Treasury sanctions Iranian cyber officials tied to 2023 water system hacks
3 months, 2 weeks ago |
malware.news
Practical Batch Proofs of Exponentiation
3 months, 2 weeks ago |
www.iacr.org
ISC StormCast for Monday, January 29th, 2024
3 months, 2 weeks ago |
isc.sans.edu
A Batch File With Multiple Payloads, (Fri, Jan 26th)
3 months, 3 weeks ago |
malware.news
Can Cyber Risk Quantification be Automated?
3 months, 3 weeks ago |
securityboulevard.com
Ways to do a Share-Point Bulk File Transfer — Reactive and Batch Job
3 months, 3 weeks ago |
malware.news
Apache Hadoop, Flink subjected to attacks
4 months, 1 week ago |
malware.news
Apache Hadoop, Flink subjected to attacks
4 months, 1 week ago |
www.scmagazine.com
The Great OneNote Scramble of 2023
4 months, 1 week ago |
malware.news
Chosen Ciphertext Security via BARGs
4 months, 3 weeks ago |
www.iacr.org
Batch Arguments to NIZKs from One-Way Functions
4 months, 3 weeks ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark