all InfoSec news
Topic: authors
Security Analysis of XHASH8/12
1 day, 4 hours ago |
www.iacr.org
USENIX Security ’23 – Inductive Graph Unlearning
3 days, 15 hours ago |
securityboulevard.com
Expand your library with these cybersecurity books
1 week, 1 day ago |
www.helpnetsecurity.com
A Note on Related-Tweakey Impossible Differential Attacks
1 week, 3 days ago |
www.iacr.org
Cybercriminal adoption of browser fingerprinting
2 weeks, 4 days ago |
www.helpnetsecurity.com
Our CVE Story: Ericsson’s Journey as a CVE Numbering Authority (CNA)
2 weeks, 6 days ago |
medium.com
Android Malware Vultur Expands Its Wingspan
3 weeks, 4 days ago |
malware.news
HotStuff-2 vs. HotStuff: The Difference and Advantage
3 weeks, 5 days ago |
arxiv.org
Metasploit Wrap-Up 03/15/2024
1 month, 1 week ago |
blog.rapid7.com
Stealing Part Of A Production Language Model
1 month, 1 week ago |
packetstormsecurity.com
Metasploit Wrap-Up 03/08/2024
1 month, 2 weeks ago |
blog.rapid7.com
Security Analysis of XHASH8/12
1 day, 4 hours ago |
www.iacr.org
USENIX Security ’23 – Inductive Graph Unlearning
3 days, 15 hours ago |
securityboulevard.com
Items published with this topic over the last 90 days.
Latest
Security Analysis of XHASH8/12
1 day, 4 hours ago |
www.iacr.org
USENIX Security ’23 – Inductive Graph Unlearning
3 days, 15 hours ago |
securityboulevard.com
Expand your library with these cybersecurity books
1 week, 1 day ago |
www.helpnetsecurity.com
A Note on Related-Tweakey Impossible Differential Attacks
1 week, 3 days ago |
www.iacr.org
Cybercriminal adoption of browser fingerprinting
2 weeks, 4 days ago |
www.helpnetsecurity.com
Our CVE Story: Ericsson’s Journey as a CVE Numbering Authority (CNA)
2 weeks, 6 days ago |
medium.com
Android Malware Vultur Expands Its Wingspan
3 weeks, 4 days ago |
malware.news
HotStuff-2 vs. HotStuff: The Difference and Advantage
3 weeks, 5 days ago |
arxiv.org
Metasploit Wrap-Up 03/15/2024
1 month, 1 week ago |
blog.rapid7.com
Stealing Part Of A Production Language Model
1 month, 1 week ago |
packetstormsecurity.com
Metasploit Wrap-Up 03/08/2024
1 month, 2 weeks ago |
blog.rapid7.com
Topic trend (last 90 days)
Top (last 7 days)
Security Analysis of XHASH8/12
1 day, 4 hours ago |
www.iacr.org
USENIX Security ’23 – Inductive Graph Unlearning
3 days, 15 hours ago |
securityboulevard.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
L2-Network Security Administrator
@ Kyndryl | KIN51515 Mumbai (KIN51515) We Work
Head of Cybersecurity Advisory and Architecture
@ CMA CGM | Marseille, FR
Systems Engineers/Cyber Security Engineers/Information Systems Security Engineer
@ KDA Consulting Inc | Herndon, Virginia, United States
R&D DevSecOps Staff Software Development Engineer 1
@ Sopra Steria | Noida, Uttar Pradesh, India